167 research outputs found
Improving the Security of United States Elections with Robust Optimization
For more than a century, election officials across the United States have
inspected voting machines before elections using a procedure called Logic and
Accuracy Testing (LAT). This procedure consists of election officials casting a
test deck of ballots into each voting machine and confirming the machine
produces the expected vote total for each candidate. We bring a scientific
perspective to LAT by introducing the first formal approach to designing test
decks with rigorous security guarantees. Specifically, our approach employs
robust optimization to find test decks that are guaranteed to detect any voting
machine misconfiguration that would cause votes to be swapped across
candidates. Out of all the test decks with this security guarantee, our robust
optimization problem yields the test deck with the minimum number of ballots,
thereby minimizing implementation costs for election officials. To facilitate
deployment at scale, we develop a practically efficient exact algorithm for
solving our robust optimization problems based on the cutting plane method. In
partnership with the Michigan Bureau of Elections, we retrospectively applied
our approach to all 6928 ballot styles from Michigan's November 2022 general
election; this retrospective study reveals that the test decks with rigorous
security guarantees obtained by our approach require, on average, only 1.2%
more ballots than current practice. Our approach has since been piloted in
real-world elections by the Michigan Bureau of Elections as a low-cost way to
improve election security and increase public trust in democratic institutions
TrustShadow: Secure Execution of Unmodified Applications with ARM TrustZone
The rapid evolution of Internet-of-Things (IoT) technologies has led to an
emerging need to make it smarter. A variety of applications now run
simultaneously on an ARM-based processor. For example, devices on the edge of
the Internet are provided with higher horsepower to be entrusted with storing,
processing and analyzing data collected from IoT devices. This significantly
improves efficiency and reduces the amount of data that needs to be transported
to the cloud for data processing, analysis and storage. However, commodity OSes
are prone to compromise. Once they are exploited, attackers can access the data
on these devices. Since the data stored and processed on the devices can be
sensitive, left untackled, this is particularly disconcerting.
In this paper, we propose a new system, TrustShadow that shields legacy
applications from untrusted OSes. TrustShadow takes advantage of ARM TrustZone
technology and partitions resources into the secure and normal worlds. In the
secure world, TrustShadow constructs a trusted execution environment for
security-critical applications. This trusted environment is maintained by a
lightweight runtime system that coordinates the communication between
applications and the ordinary OS running in the normal world. The runtime
system does not provide system services itself. Rather, it forwards requests
for system services to the ordinary OS, and verifies the correctness of the
responses. To demonstrate the efficiency of this design, we prototyped
TrustShadow on a real chip board with ARM TrustZone support, and evaluated its
performance using both microbenchmarks and real-world applications. We showed
TrustShadow introduces only negligible overhead to real-world applications.Comment: MobiSys 201
Comparing "challenge-based" and "code-based" internet voting verification implementations
Internet-enabled voting introduces an element of invisibility and unfamiliarity into the voting process, which makes it very different from traditional voting. Voters might be concerned about their vote being recorded correctly and included in the final tally. To mitigate mistrust, many Internet-enabled voting systems build verifiability into their systems. This allows voters to verify that their votes have been cast as intended, stored as cast and tallied as stored at the conclusion of the voting period. Verification implementations have not been universally successful, mostly due to voter difficulties using them. Here, we evaluate two cast as intended verification approaches in a lab study: (1) "Challenge-Based" and (2) "Code-Based". We assessed cast-as-intended vote verification efficacy, and identified usability issues related to verifying and/or vote casting. We also explored acceptance issues post-verification, to see whether our participants were willing to engage with Internet voting in a real election. Our study revealed the superiority of the code-based approach, in terms of ability to verify effectively. In terms of real-life Internet voting acceptance, convenience encourages acceptance, while security concerns and complexity might lead to rejection
OpenVPN is Open to VPN Fingerprinting
VPN adoption has seen steady growth over the past decade due to increased
public awareness of privacy and surveillance threats. In response, certain
governments are attempting to restrict VPN access by identifying connections
using "dual use" DPI technology. To investigate the potential for VPN blocking,
we develop mechanisms for accurately fingerprinting connections using OpenVPN,
the most popular protocol for commercial VPN services. We identify three
fingerprints based on protocol features such as byte pattern, packet size, and
server response. Playing the role of an attacker who controls the network, we
design a two-phase framework that performs passive fingerprinting and active
probing in sequence. We evaluate our framework in partnership with a
million-user ISP and find that we identify over 85% of OpenVPN flows with only
negligible false positives, suggesting that OpenVPN-based services can be
effectively blocked with little collateral damage. Although some commercial
VPNs implement countermeasures to avoid detection, our framework successfully
identified connections to 34 out of 41 "obfuscated" VPN configurations. We
discuss the implications of the VPN fingerprintability for different threat
models and propose short-term defenses. In the longer term, we urge commercial
VPN providers to be more transparent about their obfuscation approaches and to
adopt more principled detection countermeasures, such as those developed in
censorship circumvention research.Comment: In: USENIX Security Symposium 2022 (USENIX Security '22
Efficient Passive ICS Device Discovery and Identification by MAC Address Correlation
Owing to a growing number of attacks, the assessment of Industrial Control
Systems (ICSs) has gained in importance. An integral part of an assessment is
the creation of a detailed inventory of all connected devices, enabling
vulnerability evaluations. For this purpose, scans of networks are crucial.
Active scanning, which generates irregular traffic, is a method to get an
overview of connected and active devices. Since such additional traffic may
lead to an unexpected behavior of devices, active scanning methods should be
avoided in critical infrastructure networks. In such cases, passive network
monitoring offers an alternative, which is often used in conjunction with
complex deep-packet inspection techniques. There are very few publications on
lightweight passive scanning methodologies for industrial networks. In this
paper, we propose a lightweight passive network monitoring technique using an
efficient Media Access Control (MAC) address-based identification of industrial
devices. Based on an incomplete set of known MAC address to device
associations, the presented method can guess correct device and vendor
information. Proving the feasibility of the method, an implementation is also
introduced and evaluated regarding its efficiency. The feasibility of
predicting a specific device/vendor combination is demonstrated by having
similar devices in the database. In our ICS testbed, we reached a host
discovery rate of 100% at an identification rate of more than 66%,
outperforming the results of existing tools.Comment: http://dx.doi.org/10.14236/ewic/ICS2018.
Public Evidence from Secret Ballots
Elections seem simple---aren't they just counting? But they have a unique,
challenging combination of security and privacy requirements. The stakes are
high; the context is adversarial; the electorate needs to be convinced that the
results are correct; and the secrecy of the ballot must be ensured. And they
have practical constraints: time is of the essence, and voting systems need to
be affordable and maintainable, and usable by voters, election officials, and
pollworkers. It is thus not surprising that voting is a rich research area
spanning theory, applied cryptography, practical systems analysis, usable
security, and statistics. Election integrity involves two key concepts:
convincing evidence that outcomes are correct and privacy, which amounts to
convincing assurance that there is no evidence about how any given person
voted. These are obviously in tension. We examine how current systems walk this
tightrope.Comment: To appear in E-Vote-Id '1
MemShield: GPU-assisted software memory encryption
Cryptographic algorithm implementations are vulnerable to Cold Boot attacks,
which consist in exploiting the persistence of RAM cells across reboots or
power down cycles to read the memory contents and recover precious sensitive
data. The principal defensive weapon against Cold Boot attacks is memory
encryption. In this work we propose MemShield, a memory encryption framework
for user space applications that exploits a GPU to safely store the master key
and perform the encryption/decryption operations. We developed a prototype that
is completely transparent to existing applications and does not require changes
to the OS kernel. We discuss the design, the related works, the implementation,
the security analysis, and the performances of MemShield.Comment: 14 pages, 2 figures. In proceedings of the 18th International
Conference on Applied Cryptography and Network Security, ACNS 2020, October
19-22 2020, Rome, Ital
Elliptic Curve Cryptography in Practice
In this paper, we perform a review of elliptic curve cryptography (ECC), as it is used in practice today, in order to reveal unique mistakes and vulnerabilities that arise in implementations of ECC. We study four popular protocols that make use of this type of public-key cryptography: Bitcoin, secure shell (SSH), transport layer security (TLS), and the Austrian e-ID card. We are pleased to observe that about 1 in 10 systems support ECC across the TLS and SSH protocols. However, we find that despite the high stakes of money, access and resources protected by ECC, implementations suffer from vulnerabilities similar to those that plague previous cryptographic systems
- …