12 research outputs found
ScaRR: Scalable Runtime Remote Attestation for Complex Systems
The introduction of remote attestation (RA) schemes has allowed academia and
industry to enhance the security of their systems. The commercial products
currently available enable only the validation of static properties, such as
applications fingerprint, and do not handle runtime properties, such as
control-flow correctness. This limitation pushed researchers towards the
identification of new approaches, called runtime RA. However, those mainly work
on embedded devices, which share very few common features with complex systems,
such as virtual machines in a cloud. A naive deployment of runtime RA schemes
for embedded devices on complex systems faces scalability problems, such as the
representation of complex control-flows or slow verification phase.
In this work, we present ScaRR: the first Scalable Runtime Remote attestation
schema for complex systems. Thanks to its novel control-flow model, ScaRR
enables the deployment of runtime RA on any application regardless of its
complexity, by also achieving good performance. We implemented ScaRR and tested
it on the benchmark suite SPEC CPU 2017. We show that ScaRR can validate on
average 2M control-flow events per second, definitely outperforming existing
solutions.Comment: 14 page
Designing a Provenance Analysis for SGX Enclaves
Intel SGX enables memory isolation and static integrity verification of code
and data stored in user-space memory regions called enclaves. SGX effectively
shields the execution of enclaves from the underlying untrusted OS. Attackers
cannot tamper nor examine enclaves' content. However, these properties equally
challenge defenders as they are precluded from any provenance analysis to infer
intrusions inside SGX enclaves. In this work, we propose SgxMonitor, a novel
provenance analysis to monitor and identify anomalous executions of enclave
code. To this end, we design a technique to extract contextual runtime
information from an enclave and propose a novel model to represent enclaves'
intrusions. Our experiments show that not only SgxMonitor incurs an overhead
comparable to traditional provenance tools, but it also exhibits
macro-benchmarks' overheads and slowdowns that marginally affect real use cases
deployment. Our evaluation shows SgxMonitor successfully identifies enclave
intrusions carried out by the state of the art attacks while reporting no false
positives and negatives during normal enclaves executions, thus supporting the
use of SgxMonitor in realistic scenarios.Comment: 16 pages, 8 figure
Google Dorks: Analysis, Creation, and New Defenses
With the advent of Web 2.0, many users started to maintain personal web pages to show information about themselves, their businesses, or to run simple e-commerce applications. This transition has been facilitated by a large number of frameworks and applications that can be easily installed and customized. Unfortunately, attackers have taken advantage of the widespread use of these technologies \u2013 for example by crafting special search engines queries to fingerprint an application framework and automatically locate possible targets. This approach, usually called Google Dorking, is at the core of many automated exploitation bots. In this paper we tackle this problem in three steps. We first perform a large-scale study of existing dorks, to understand their typology and the information attackers use to identify their target applications. We then propose a defense technique to render URL-based dorks ineffective. Finally we study the effectiveness of building dorks by using only combinations of generic words, and we propose a simple but effective way to protect web applications against this type of fingerprinting