69 research outputs found
Installing fake root keys in a PC
Abstract. If a malicious party can insert a self-issued CA public key into the list of root public keys stored in a PC, then this party could potentially do considerable harm to that PC. In this paper, we present a way to achieve such an attack for the Internet Explorer web browser root key store, which avoids attracting the user’s attention. A realisation of this attack is also described. Finally, countermeasures that can be deployed to prevent such an attack are outlined.
Masquerading Techniques in IEEE 802.11 Wireless Local Area Networks
The airborne nature of wireless transmission offers a potential target for attackers to compromise IEEE 802.11 Wireless Local Area Network (WLAN). In this dissertation, we explore the current WLAN security threats and their corresponding defense solutions. In our study, we divide WLAN vulnerabilities into two aspects, client, and administrator. The client-side vulnerability investigation is based on examining the Evil Twin Attack (ETA) while our administrator side research targets Wi-Fi Protected Access II (WPA2). Three novel techniques have been presented to detect ETA. The detection methods are based on (1) creating a secure connection to a remote server to detect the change of gateway\u27s public IP address by switching from one Access Point (AP) to another. (2) Monitoring multiple Wi-Fi channels in a random order looking for specific data packets sent by the remote server. (3) Merging the previous solutions into one universal ETA detection method using Virtual Wireless Clients (VWCs). On the other hand, we present a new vulnerability that allows an attacker to force the victim\u27s smartphone to consume data through the cellular network by starting the data download on the victim\u27s cell phone without the victim\u27s permission. A new scheme has been developed to speed up the active dictionary attack intensity on WPA2 based on two novel ideas. First, the scheme connects multiple VWCs to the AP at the same time-each VWC has its own spoofed MAC address. Second, each of the VWCs could try many passphrases using single wireless session. Furthermore, we present a new technique to avoid bandwidth limitation imposed by Wi-Fi hotspots. The proposed method creates multiple VWCs to access the WLAN. The combination of the individual bandwidth of each VWC results in an increase of the total bandwidth gained by the attacker. All proposal techniques have been implemented and evaluated in real-life scenarios
Enhancing End User Security - Attacks & Solutions
End user computing environments, e.g. web browsers and PC operating
systems, are the target of a large number of attacks, both online
and offline. The nature of these attacks varies from simple online
attacks, such as user tracking using cookies, to more sophisticated
attacks on security protocols and cryptographic algorithms. Other
methods of attack exist that target end user applications that
utilise and interact with cryptographic functions provided by the PC
operating system.
After providing a general introduction to the security techniques
and protocols used in this thesis, a review of possible threats to
end user computing environments is given, followed by a discussion
of the countermeasures needed to combat these threats. The
contributions of this thesis include three new approaches for
enhancing the security of end user systems, together with an
analysis and a prototype implementation of an end user security
enhancement tool. The following paragraphs summarise the three main
contributions of this thesis.
Digitally signing a digital document is a straightforward procedure;
however, when the digital document contains dynamic content, the
digital signature may remain valid but the viewed document may not
be the same as the document when viewed by the signer. A new
solution is proposed to solve the problem; the main idea behind the
solution is to make the application aware of the sensitive
cryptographic function being requested.
In order to verify a digital signature computed on a document or any
other object (e.g. an executable), access to the public key
corresponding to the private key used to sign the document is
required. Normally, the public part of the key is made available in
a digital 'certificate', which is made up of the public key of the
signer, the name of the signer, and other data, all signed using the
private signing key of a trusted third party known as a
Certification Authority (CA). To verify such a certificate, and
thereby obtain a trusted copy of the document signer's public key, a
trusted copy of the CA's public key is required. If a malicious
party can insert a fake CA public key into the list of CA public
keys stored in a PC, then this party could potentially do
considerable harm to that PC, since this malicious party could then
forge signatures apparently created by other entities. A method of
achieving such an attack without attracting the user's attention is
presented in this thesis. Countermeasures that can be deployed to
prevent the insertion of a fake root public key are discussed. A
suggested solution that can be used to detect and remove such fake
keys is presented, and a prototype implementation of this solution
is described.
SSL/TLS supports mutual authentication, i.e. both server and client
authentication, using public key certificates. However, this
optional feature of SSL/TLS is not widely used because most end
users do not have a certified public key. Certain attacks rely on
this fact, such as web spoofing and phishing attacks. A method for
supporting client-side SSL authentication using trusted computing
platforms is proposed. The proposed approach makes a class of
phishing attacks ineffective; moreover, the proposed method can also
be used to protect against other online attacks
Grid Portal Development
The project consists of the analysis, design and implementation of a user account creation system and a notification system for the P-GRADE Grid Portal. The user account creation system expedites the process of accessing a portal by automating many administrative tasks. The notification system provides a useful feature to users of the Portal by alerting them in real time of the status of their workflows. Both systems serve to enhance a user\u27s experience with the Portal
Counteracting phishing through HCI
Computer security is a very technical topic that is in many cases hard to grasp for the average user. Especially when using the Internet, the biggest network connecting computers globally together, security and safety are important. In many cases they can be achieved without the user's active participation: securely storing user and customer data on Internet servers is the task of the respective company or service provider, but there are also a lot of cases where the user is involved in the security process, especially when he or she is intentionally attacked. Socially engineered phishing attacks are such a security issue were users are directly attacked to reveal private data and credentials to an unauthorized attacker. These types of attacks are the main focus of the research presented within my thesis.
I have a look at how these attacks can be counteracted by detecting them in the first place but also by mediating these detection results to the user. In prior research and development these two areas have most often been regarded separately, and new security measures were developed without taking the final step of interacting with the user into account. This interaction mainly means presenting the detection results and receiving final decisions from the user. As an overarching goal within this thesis I look at these two aspects united, stating the overall protection as the sum of detection and "user intervention".
Within nine different research projects about phishing protection this thesis gives answers to ten different research questions in the areas of creating new phishing detectors (phishing detection) and providing usable user feedback for such systems (user intervention): The ten research questions cover five different topics in both areas from the definition of the respective topic over ways how to measure and enhance the areas to finally reasoning about what is making sense. The research questions have been chosen to cover the range of both areas and the interplay between them. They are mostly answered by developing and evaluating different prototypes built within the projects that cover a range of human-centered detection properties and evaluate how well these are suited for phishing detection. I also take a look at different possibilities for user intervention (e.g. how should a warning look like? should it be blocking or non-blocking or perhaps even something else?). As a major contribution I finally present a model that combines phishing detection and user intervention and propose development and evaluation recommendations for similar systems. The research results show that when developing security detectors that yield results being relevant for end users such a detector can only be successful in case the final user feedback already has been taken into account during the development process.Sicherheit rund um den Computer ist ein, für den durchschnittlichen Benutzer schwer zu verstehendes Thema. Besonders, wenn sich die Benutzer im Internet - dem größten Netzwerk unserer Zeit - bewegen, ist die technische und persönliche Sicherheit der Benutzer extrem wichtig. In vielen Fällen kann diese ohne das Zutun des Benutzers erreicht werden. Datensicherheit auf Servern zu garantieren obliegt den Dienstanbietern, ohne dass eine aktive Mithilfe des Benutzers notwendig ist. Es gibt allerdings auch viele Fälle, bei denen der Benutzer Teil des Sicherheitsprozesses ist, besonders dann, wenn er selbst ein Opfer von Attacken wird. Phishing Attacken sind dabei ein besonders wichtiges Beispiel, bei dem Angreifer versuchen durch soziale Manipulation an private Daten des Nutzers zu gelangen. Diese Art der Angriffe stehen im Fokus meiner vorliegenden Arbeit.
Dabei werfe ich einen Blick darauf, wie solchen Attacken entgegen gewirkt werden kann, indem man sie nicht nur aufspürt, sondern auch das Ergebnis des Erkennungsprozesses dem Benutzer vermittelt. Die bisherige Forschung und Entwicklung betrachtete diese beiden Bereiche meistens getrennt. Dabei wurden Sicherheitsmechanismen entwickelt, ohne den finalen Schritt der Präsentation zum Benutzer hin einzubeziehen. Dies bezieht sich hauptsächlich auf die Präsentation der Ergebnisse um dann den Benutzer eine ordnungsgemäße Entscheidung treffen zu lassen. Als übergreifendes Ziel dieser Arbeit betrachte ich diese beiden Aspekte zusammen und postuliere, dass Benutzerschutz die Summe aus Problemdetektion und Benutzerintervention' ("user intervention") ist.
Mit Hilfe von neun verschiedenen Forschungsprojekten über Phishingschutz beantworte ich in dieser Arbeit zehn Forschungsfragen über die Erstellung von Detektoren ("phishing detection") und das Bereitstellen benutzbaren Feedbacks für solche Systeme ("user intervention"). Die zehn verschiedenen Forschungsfragen decken dabei jeweils fünf verschiedene Bereiche ab. Diese Bereiche erstrecken sich von der Definition des entsprechenden Themas über Messmethoden und Verbesserungsmöglichkeiten bis hin zu Überlegungen über das Kosten-Nutzen-Verhältnis. Dabei wurden die Forschungsfragen so gewählt, dass sie die beiden Bereiche breit abdecken und auf die Abhängigkeiten zwischen beiden Bereichen eingegangen werden kann. Die Forschungsfragen werden hauptsächlich durch das Schaffen verschiedener Prototypen innerhalb der verschiedenen Projekte beantwortet um so einen großen Bereich benutzerzentrierter Erkennungsparameter abzudecken und auszuwerten wie gut diese für die Phishingerkennung geeignet sind. Außerdem habe ich mich mit den verschiedenen Möglichkeiten der Benutzerintervention befasst (z.B. Wie sollte eine Warnung aussehen? Sollte sie Benutzerinteraktion blockieren oder nicht?). Ein weiterer Hauptbeitrag ist schlussendlich die Präsentation eines Modells, dass die Entwicklung von Phishingerkennung und Benutzerinteraktionsmaßnahmen zusammenführt und anhand dessen dann Entwicklungs- und Analyseempfehlungen für ähnliche Systeme gegeben werden. Die Forschungsergebnisse zeigen, dass Detektoren im Rahmen von Computersicherheitsproblemen die eine Rolle für den Endnutzer spielen nur dann erfolgreich entwickelt werden können, wenn das endgültige Benutzerfeedback bereits in den Entwicklungsprozesses des Detektors einfließt
A Low-Energy Security Solution for IoT-Based Smart Farms
This work proposes a novel configuration of the Transport Layer Security protocol (TLS),
suitable for low energy Internet of Things (IoT), applications. The motivation behind
the redesign of TLS is energy consumption minimisation and sustainable farming, as
exemplified by an application domain of aquaponic smart farms. The work therefore considers
decentralisation of a formerly centralised security model, with a focus on reducing energy
consumption for battery powered devices. The research presents a four-part investigation
into the security solution, composed of a risk assessment, energy analysis of authentication
and data exchange functions, and finally the design and verification of a novel consensus
authorisation mechanism. The first investigation considered traditional risk-driven threat
assessment, but to include energy reduction, working towards device longevity within a
content-oriented framework. Since the aquaponics environments include limited but specific
data exchanges, a content-oriented approach produced valuable insights into security and
privacy requirements that would later be tested by implementing a variety of mechanisms
available on the ESP32.
The second and third investigations featured the energy analysis of authentication
and data exchange functions respectively, where the results of the risk assessment were
implemented to compare the re-configurations of TLS mechanisms and domain content.
Results concluded that selective confidentiality and persistent secure sessions between paired
devices enabled considerable improvements for energy consumptions, and were a good
reflection of the possibilities suggested by the risk assessment.
The fourth and final investigation proposed a granular authorisation design to increase
the safety of access control that would otherwise be binary in TLS. The motivation was
for damage mitigation from inside attacks or network faults. The approach involved an
automated, hierarchy-based, decentralised network topology to reduce data duplication whilst
still providing robustness beyond the vulnerability of central governance. Formal verification
using model-checking indicated a safe design model, using four automated back-ends.
The research concludes that lower energy IoT solutions for the smart farm application
domain are possible
Cyberphysical Constructs and Concepts for Fully Automated Networked Vehicles
Human lives are at stake in networked systems of automated vehicles. Drawing from mature domains where life/safety critical cyberphysical systems have already been deployed as well as from various scientific disciplines, we introduce the SPEC (Safety, Privacy, Efficiency, Cybersecurity) problem which arises in self-organizing and self-healing networks of fully automated terrestrial vehicles, and CMX functionalities intended for vehicular onboard systems. CM stands for Coordinated Mobility, X stands for S, P, E and C. The CMX framework encompasses cyberphysical constructs (cells, cohorts) endowed with proven properties, onboard proactive security modules, unfalsifiable cyberphysical levels, protocols and distributed algorithms for timed-bounded inter-vehicular communications, reliable message dissemination, trusted explicit agreements/coordination, and privacy preserving options that insulate passengers from illegitimate internal cyber-surveillance and external eavesdropping and tracking. We establish inter alia that safety and privacy can be obtained jointly, by design. The focus of this report is on SE properties. Notably, we show how to achieve theoretical absolute safety (0 fatalities and 0 severe injuries in rear-end collisions and pileups) and highest efficiency (smallest safe inter-vehicular gaps) jointly, by design, in spontaneous cohorts of vehicles. Results conveyed in this report shall open new opportunities for innovative research and development of high societal impact.Les vies humaines sont en jeu dans les réseaux de véhicules automatisés, à l’instar de domaines matures où des systèmes critiques en matière de sécurité-innocuité ont déjà été déployés. Les connaissances acquises dans ces domaines ainsi que dans diverses disciplines scientifiques permettent de définir le problème SPEC (Safety, Privacy, Efficiency, Cybersecurity) qui se pose dans les réseaux auto-organisés et auto-réparateurs de véhicules terrestres à conduite entièrement automatisée. On introduit CMX, un ensemble de fonctionnalités destinées aux systèmes bord. CM est l’abréviation de Coordinated Mobility, et X signifie S, P, E et C. L’ensemble CMX repose sur des constructions cyberphysiques (cellules, cohortes) dotées de propriétés prouvées, les concepts de module de sécurité proactif et de niveaux cyberphysiques infalsifiables, des protocoles et des algorithmes distribués pour communications inter-véhiculaires en temps borné, dissémination fiable de messages, coordination et accords explicites dignes de confiance, ainsi que sur des options de protection de la vie privée qui permettent aux passagers d’interdire la cyber-surveillance illégitime interne et externe (écoutes radio et pistage des trajets). On établit qu’il est possible de garantir conjointement sécurité-innocuité (safety) et respect de la vie privée (privacy), par conception. Ce rapport est consacré aux propriétés SE. En particulier, on montre comment obtenir la sécurité-innocuité absolue théorique (taux nul de mortalité et de graves blessures en cas de collisions longitudinales) et maximiser l’efficacité (espaces inter-véhiculaires minimaux) conjointement, par conception, dans les cohortes spontanées de véhicules. Les résultats contenus dans ce rapport devraient ouvrir de nouvelles perspectives de recherche et développement à fort impact sociétal
- …