SLIDE 1 Integrity Assurance in Resource-Bounded Systems through Stochastic Message Authentication
Aron Laszka, Yevgeniy Vorobeychik, and Xenofon Koutsoukos Institute for Software Integrated Systems Department of Electrical Engineering and Computer Science
The Science of Security initiative is funded by the National Security Agency http://hot-sos.org/
2nd Symposium and Bootcamp on the Science of Security (HotSoS)
April 21st, 2015
SLIDE 2 Data Integrity
assuring that data cannot be modified in an unauthorized and undetected manner
- Classic, non-resource-bounded example:
desktop computer webserver
HTTPS Not really an issue these days, right?
SLIDE 3 Example of Data-Tampering
Traffic monitoring: Sensys Networks VDS240
- wireless vehicle detection system based on magnetic sensors
embedded in roadways
- insecure communication protocol lacks integrity protection
- attacker may cause disastrous traffic congestions
SLIDE 4
tag tag
Message Authentication
message message message
secret key secret key
m3554ge tag
cryptographic computation
m3554ge tag’
cryptographic computation
computationally expensive
SLIDE 5
Sufficient resources Insufficient resources Limited amount of resources
messages are not verified
zero security
messages are verified
maximum security
some messages
are verified
maximal achievable security
SLIDE 6
tag2 tag2
Stochastic Verification
message1 message1 tag1 message2 message1 m3554ge2
select randomly which messages to verify
m3554ge2
verify
tag1
verify
?
SLIDE 7 Applications
- In many scenarios, suboptimal data acquisition and control is
costly but not disastrous
- inefficient traffic control
- incorrect smart-metering
- …
- Resource-bounded devices
- battery-powered devices
- legacy devices
- low-performance devices
- …
- Comparison to lightweight cryptography
- we build on well-known and widely deployed cryptographic primitives
- our system adapts to arbitrary resource bounds
SLIDE 8 Game-Theoretic Model
“Which messages to verify?”
- Stackelberg security game with a defender and an attacker
Messages
- divided into classes
- messages of class i may cause Li damage
- 1. Defender
- chooses verification probabilities pi
- subject to computational budget constraint
∑piTi ≤ B where Ti is the cost of verifying all messages of class i
SLIDE 9 Game-Theoretic Model (contd.)
- 2. Attacker
- selects the number ai of modified/forged messages for each class i
- knows the defender’s strategy (i.e., pi for every i)
attack detected:
attacker receives punishment F attack not detected:
defender loses /
attacker gains ∑aiLi
- 3. Payoffs
- utcome:
- 1. Defender
Π(1 - pi)ai
1 - Π(1 - pi)ai
SLIDE 10
Illustration of the Defender’s Payoff
F = 0.5, L1 = 1, L2 =3
p1 p2
“region of deterrence”
Defender’s
payoff
SLIDE 11 Deterrence Strategies
attacker’s best response is not to modify any messages Theorem: The defender has a deterrence strategy if and
and the minimal deterrence strategy is
SLIDE 12
Non-Deterrence Strategies
F = 0.5, L1 = 1, L2 =3
p1 p2 Defender’s
payoff
B
p2* p1*
SLIDE 13 Theorem: Optimal strategy in the continuous relaxation is
Continuous Relaxation
- No closed-form solution for the original model
- Continuous relaxation of the model
- ai is continuous (i.e., ai = 1.5 means that the attacker modifies one
and a half messages)
SLIDE 14
Numerical Example Comparing Strategies
Defender’s loss Computational budget B
F = 0.5, L1 = 1, L2 = 2, L3 = 3, T1 = T2 = T3 = 1
SLIDE 15
Numerical Example Comparing Strategies
Defender’s loss Computational budget B
F = 0.5, L1 = 1, L2 = 2, L3 = 3, T1 = T2 = T3 = 1
SLIDE 16 Experiments
- Implementation and testing on an
ATmega328P microcontroller
- Message authentication tag
generation and verification:
authentication code)
- using the SHA-1 hash function
- Random number generation:
- linear-feedback shift register
SLIDE 17
Experimental Results
Probabilities ∑pi Running time per message [ms]
SLIDE 18 Resource-Bounded Senders
- So far, we have saved computation only at the receiver
- Two-way communication
“Could we also save computation when generating tags?”
- next: stochastic authentication tag generation
sender receiver sender receiver
up to 100% saving
when receiving
+ 0% saving when
sending up to 50% saving
SLIDE 19 Stochastic Message Authentication
message1 message1 message2 tag fake tag message2 … message1 m3554ge2 …
?
send a random subset
correct tags
message2 m3554ge1
detect modifications to messages with correct tags
- Fake tags
- indistinguishable from correct tags for the attacker
- distinguishable from incorrect tags for the receiver
- computationally inexpensive to generate and verify
SLIDE 20 Generating and Verifying Fake Tags
- Proof-of-concept algorithms based on the HMAC construction
with a Merkle-Damgard hash function
- Implementation and testing show substantial savings for both
the receiver and sender on an ATmega328P microcontroller
SLIDE 21 Conclusion
- Stochastic message verification
- message authentication for
resource-bounded devices
- game-theoretic model for defending
against worst-case attackers
- experimental results confirm
computational cost model
- Next: stochastic message authentication tag generation
- allows saving computation for both sender and receiver
SLIDE 22
Thank you for your attention! Questions?