Integrity Assurance in Resource-Bounded Systems through Stochastic - - PowerPoint PPT Presentation

integrity assurance in resource bounded systems through
SMART_READER_LITE
LIVE PREVIEW

Integrity Assurance in Resource-Bounded Systems through Stochastic - - PowerPoint PPT Presentation

2nd Symposium and Bootcamp on the Science of Security (HotSoS) April 21st, 2015 Integrity Assurance in Resource-Bounded Systems through Stochastic Message Authentication Aron Laszka, Yevgeniy Vorobeychik, and Xenofon Koutsoukos Institute for


slide-1
SLIDE 1

Integrity Assurance in Resource-Bounded Systems through Stochastic Message Authentication

Aron Laszka, Yevgeniy Vorobeychik, and Xenofon Koutsoukos Institute for Software Integrated Systems Department of Electrical Engineering and Computer Science

The Science of Security initiative is funded by the National Security Agency http://hot-sos.org/

2nd Symposium and Bootcamp on the Science of Security (HotSoS)
 April 21st, 2015

slide-2
SLIDE 2

Data Integrity

  • Data integrity:


assuring that data cannot be modified in an unauthorized and undetected manner

  • Classic, non-resource-bounded example:

desktop computer webserver

HTTPS Not really an issue these days, right?

slide-3
SLIDE 3

Example of Data-Tampering

Traffic monitoring: Sensys Networks VDS240

  • wireless vehicle detection system based on magnetic sensors

embedded in roadways

  • insecure communication protocol lacks integrity protection
  • attacker may cause disastrous traffic congestions
slide-4
SLIDE 4

tag tag

Message Authentication

message message message

secret key secret key

m3554ge tag

cryptographic computation

m3554ge tag’

cryptographic computation

computationally expensive

slide-5
SLIDE 5

Sufficient resources Insufficient resources Limited amount of resources

messages are not verified

zero security

messages are verified

maximum security

some messages 
 are verified

maximal achievable security

slide-6
SLIDE 6

tag2 tag2

Stochastic Verification

message1 message1 tag1 message2 message1 m3554ge2

select randomly which messages to verify

m3554ge2

verify

tag1

verify

?

slide-7
SLIDE 7

Applications

  • In many scenarios, suboptimal data acquisition and control is

costly but not disastrous

  • inefficient traffic control
  • incorrect smart-metering
  • Resource-bounded devices
  • battery-powered devices
  • legacy devices
  • low-performance devices
  • Comparison to lightweight cryptography
  • we build on well-known and widely deployed cryptographic primitives
  • our system adapts to arbitrary resource bounds
slide-8
SLIDE 8

Game-Theoretic Model

“Which messages to verify?”

  • Stackelberg security game with a defender and an attacker

Messages

  • divided into classes
  • messages of class i may cause Li damage
  • 1. Defender
  • chooses verification probabilities pi
  • subject to computational budget constraint

∑piTi ≤ B where Ti is the cost of verifying all messages of class i

slide-9
SLIDE 9

Game-Theoretic Model (contd.)

  • 2. Attacker
  • selects the number ai of modified/forged messages for each class i
  • knows the defender’s strategy (i.e., pi for every i)

attack detected:
 attacker receives punishment F attack not detected: 
 defender loses / 
 attacker gains ∑aiLi

  • 3. Payoffs
  • utcome:
  • 1. Defender

Π(1 - pi)ai

1 - Π(1 - pi)ai

slide-10
SLIDE 10

Illustration of the Defender’s Payoff

F = 0.5, L1 = 1, L2 =3

p1 p2

“region of deterrence”

Defender’s 
 payoff

slide-11
SLIDE 11

Deterrence Strategies

  • Deterrence strategy:


attacker’s best response is not to modify any messages Theorem: The defender has a deterrence strategy if and

  • nly if

and the minimal deterrence strategy is

slide-12
SLIDE 12

Non-Deterrence Strategies

F = 0.5, L1 = 1, L2 =3

p1 p2 Defender’s 
 payoff

B

p2* p1*

slide-13
SLIDE 13

Theorem: Optimal strategy in the continuous relaxation is

Continuous Relaxation

  • No closed-form solution for the original model
  • Continuous relaxation of the model
  • ai is continuous (i.e., ai = 1.5 means that the attacker modifies one

and a half messages)

slide-14
SLIDE 14

Numerical Example Comparing Strategies

Defender’s loss Computational budget B

F = 0.5, L1 = 1, L2 = 2, L3 = 3, T1 = T2 = T3 = 1

slide-15
SLIDE 15

Numerical Example Comparing Strategies

Defender’s loss Computational budget B

F = 0.5, L1 = 1, L2 = 2, L3 = 3, T1 = T2 = T3 = 1

slide-16
SLIDE 16

Experiments

  • Implementation and testing on an

ATmega328P microcontroller

  • Message authentication tag

generation and verification:

  • HMAC (keyed-hash message

authentication code)

  • using the SHA-1 hash function
  • Random number generation:
  • linear-feedback shift register
slide-17
SLIDE 17

Experimental Results

Probabilities ∑pi Running time per message [ms]

slide-18
SLIDE 18

Resource-Bounded Senders

  • So far, we have saved computation only at the receiver
  • Two-way communication

“Could we also save computation when generating tags?”

  • next: stochastic authentication tag generation

sender receiver sender receiver

up to 100% saving 
 when receiving
 + 0% saving when
 sending up to 50% saving 


  • verall
slide-19
SLIDE 19

Stochastic Message Authentication

message1 message1 message2 tag fake tag message2 … message1 m3554ge2 …

?

send a random subset

  • f the messages with

correct tags

message2 m3554ge1

detect modifications to messages with correct tags

  • Fake tags
  • indistinguishable from correct tags for the attacker
  • distinguishable from incorrect tags for the receiver
  • computationally inexpensive to generate and verify
slide-20
SLIDE 20

Generating and Verifying Fake Tags

  • Proof-of-concept algorithms based on the HMAC construction

with a Merkle-Damgard hash function

  • Implementation and testing show substantial savings for both

the receiver and sender on an ATmega328P microcontroller

slide-21
SLIDE 21

Conclusion

  • Stochastic message verification
  • message authentication for 


resource-bounded devices

  • game-theoretic model for defending 


against worst-case attackers

  • experimental results confirm 


computational cost model

  • Next: stochastic message authentication tag generation
  • allows saving computation for both sender and receiver
slide-22
SLIDE 22

Thank you for your attention! Questions?