Predictive Mitigation of Timing Channels in Interactive Systems - - PowerPoint PPT Presentation

predictive mitigation of timing channels in interactive
SMART_READER_LITE
LIVE PREVIEW

Predictive Mitigation of Timing Channels in Interactive Systems - - PowerPoint PPT Presentation

Predictive Mitigation of Timing Channels in Interactive Systems Danfeng Zhang , Aslan Askarov, Andrew C. Myers Cornell University CCS 2011 Timing Channels Hard to detect and prevent 10/20/2011 2 Timing Channels: Examples Cryptographic


slide-1
SLIDE 1

Predictive Mitigation of Timing Channels in Interactive Systems

Danfeng Zhang, Aslan Askarov, Andrew C. Myers Cornell University CCS 2011

slide-2
SLIDE 2

Timing Channels

Hard to detect and prevent

10/20/2011 2

slide-3
SLIDE 3

Timing Channels: Examples

  • Cryptographic timing attacks [Kocher 96, Brumley&Boneh 05,

Osvik et. al. 06]

– RSA, AES keys are leaked by decryption time

  • Cross-site timing attacks [Bortz&Boneh 07]

– Load time of a web-page reveals login status, as well as the size and contents of shopping cart

  • Use as covert channels [Meer&Slaviero 07]

– Transmit confidential data by controlling response time, e.g., combined with SQL injection

  • Timing channels are big threats to security!

10/20/2011 3

slide-4
SLIDE 4

Timing Channel Mitigation

  • Limitations of known approaches

– Delay to the worst-case execution time – bad performance – Add random delays – linear leakage – Input blinding – specialized to cryptography

  • Our solution:

– Asymptotically logarithmic leakage – Effective in practice – Applies to general computation

10/20/2011 4

slide-5
SLIDE 5

Outline

  • Background on predictive black-box mitigation

(CCS’10)

  • Predictive mitigation for interactive systems (e.g.,

web services)

– Prediction with public information – Generalized penalty policy & leakage analysis – Composition of mitigators

  • Evaluation

10/20/2011 5

slide-6
SLIDE 6

Background: Predictive Black-Box Mitigation of Timing Channels (CCS’10)

10/20/2011 6

Strong attacker model: timing of source events may be controlled system mitigator buffer source events delayed events

Issue events according to schedules

slide-7
SLIDE 7

Example: Doubling

time

S(2) S(4) S(6) S(8) S(10) S(12) S(14)

predictions

When mitigator expects to deliver events Mitigator starts with a fixed schedule S S(i) – prediction for i-th event

10/20/2011 7

slide-8
SLIDE 8

Example: Doubling

time

S(2) S(4) S(6) S(8) S(10) S(12) S(14)

events When event comes before or at the prediction – delay the event misprediction

X

10/20/2011 8

little information leaked

slide-9
SLIDE 9

Example: Doubling

time

S(2) S2(3) S2(4) S2(5) S2(6) S2(7) S2(8)

events Adversary observes mispredictions New fixed schedule S2 penalizes the event source

X

new schedule

10/20/2011 9

information leaked!

slide-10
SLIDE 10

Example: Doubling

Epoch: period of time during which mitigator meets all predictions

epoch 1 epoch 2

10/20/2011 10

time

S(2) S2(3) S2(4) S2(5) S2(6) S2(7) S2(8) X

Little information leaked in each epoch

slide-11
SLIDE 11

Leakage & Variations

  • Leakage measurement (log of # timing variations)

– Also bounds

  • mutual information (Shannon entropy)
  • min-entropy

10/20/2011 11

Variations observable by the attacker

slide-12
SLIDE 12

Important Features

  • Information leaks via mispredictions!
  • General class of timing mitigators

– Doubling scheme – Adaptive transitions – ...

Leakage ≤ bits

) (log

2 T

O

10/20/2011 12

slide-13
SLIDE 13

Outline

  • Background on predictive black-box mitigation

(CCS’10)

  • Predictive mitigation for interactive systems (e.g.,

web services)

– Prediction with public information – Generalized penalty policy & leakage analysis – Composition of mitigators

  • Evaluation

10/20/2011 13

slide-14
SLIDE 14

Insight: Use Public Information

  • Previous black-box model

– No misprediction: events delivered according to schedule – Misprediction: entire schedule is statically determined (difficult for interactive systems)

10/20/2011 14

Mitigator

misprediction? Schedule Generator current schedule No Yes source events delayed events safe

slide-15
SLIDE 15

Mitigator

Insight: Use Public Information

  • Previous black-box model

– Schedule is dynamically calculated by prediction algorithm – No misprediction: schedule is deterministic given public info. – Misprediction: select a new prediction algorithm

10/20/2011 15

Algorithm Generator any public information misprediction? No Yes current prediction algorithm source events delayed events safe

slide-16
SLIDE 16

Outline

  • Background on predictive black-box mitigation

(CCS’10)

  • Predictive mitigation for interactive systems (e.g.,

web services)

– Prediction with public information – Generalized penalty policy & leakage analysis – Composition of mitigators

  • Evaluation

10/20/2011 16

slide-17
SLIDE 17

Public Information

  • Public information in interactive systems

– Request types: public payloads in requests, such as URLs

  • www.example.com/index.html vs. www.example.com/background.gif

– Public information in system: such as input times – Concurrency model

10/20/2011 17

system mitigator buffer source events delayed events inputs stem

secrets non-secrets

slide-18
SLIDE 18

Prediction with Public Information

  • Prediction for request type r: p (N, r)
  • Schedule (output time) for ith event in the Nth epoch

– Single thread – Multiple, concurrent threads

  • Calculated in similar ways

10/20/2011 18

Epoch # Start time Handling time

Schedules are computed dynamically within each epoch using only public information

prediction algorithm

slide-19
SLIDE 19

Information Leakage

  • Information still leaks via mispredictions!
  • Formal result

# of messages

Leakage ≤ bits

) 1 log(   M N

10/20/2011 19

# of epochs

slide-20
SLIDE 20

Outline

  • Background on predictive black-box mitigation

(CCS’10)

  • Predictive mitigation for interactive systems (e.g.,

web services)

– Prediction with public information – Generalized penalty policy & leakage analysis – Composition of mitigators

  • Evaluation

10/20/2011 20

slide-21
SLIDE 21

Penalty Policy ̶ What

Penalty policy

– Which type should be penalized? – How much it should be penalized?

time

S(2) S(4) S(6) S(8) S(10) S(12) S(14)

misprediction

X

time

S(2) S(4) S(6) S(8) S(10) S(12) S(14) Type 1 Type 2

10/20/2011 21

slide-22
SLIDE 22

Penalty Policy ̶ Why

  • Concurrency & request types also bring new threats
  • Request types are penalized separately (local penalty

policy)

– Attacker controls the timing of R request types

  • N is proportional to R
  • Penalize all request types (global penalty policy)

– Performance is bad

10/20/2011 22

# of messages

Leakage ≤ bits

) 1 log(   M N

# of epochs

slide-23
SLIDE 23

Grace Period Penalty Policy

  • Better trade off?

– Information leaks via mispredictions! – “Well-behaved” types

  • Few mispredictions, leak little information
  • Share little penalty from other types
  • l-level grace period policy

– type i is penalized by other types only when it triggers more than l mispredictions

10/20/2011 23

slide-24
SLIDE 24

Leakage Analysis

  • Difficult for general penalty policies

– Influences between request types – Different predictions – Need to consider all possible input sequences

  • Principled way of bounding total leakage

– Transform into optimization problem with R constraints (formal proof & details provided in paper)

10/20/2011 24

# request types

slide-25
SLIDE 25

Leakage Analysis

Leakage

– Global: – Local: – Grace period:

  • Better trade-off

10/20/2011 25

) log (log M T O 

) log log ( M T R O  

) log (log M T O 

# request types running time # of messages

slide-26
SLIDE 26

Outline

  • Background on predictive black-box mitigation

(CCS’10)

  • Predictive mitigation for interactive systems (e.g.,

web services)

– Prediction with public information – Generalized penalty policy & leakage analysis – Composition of mitigators

  • Evaluation

10/20/2011 26

slide-27
SLIDE 27

Composition of Mitigators

  • Security guarantee on an interactive system that is

– composed of mitigated subsystems

  • Decompose complicated systems into 2 gadgets

– Sequential – Parallel

10/20/2011 27

slide-28
SLIDE 28

Sequential Case

Theoretical results

– Leakage in O2 ≤ Leakage in O1 – Valid for

  • mutual information
  • min-entropy

RSA M1 S2

10 bits

?

M2

S O1 O2

10/20/2011 28

slide-29
SLIDE 29

Parallel Case

Theoretical result

– Leakage in O1 and O2 ≤ Leakage in O1 + Leakage in O2

?

10 bits 20 bits RSA M1 M2

S

O1 O2

10/20/2011 29

slide-30
SLIDE 30

Outline

  • Background on predictive black-box mitigation

(CCS’10)

  • Predictive mitigation for interactive systems (e.g.,

web services)

– Prediction with public information – Generalized penalty policy & leakage analysis – Composition of mitigators

  • Evaluation

10/20/2011 30

slide-31
SLIDE 31

Evaluation

Real-world web applications (with HTTP(S) proxy)

Real-world applications

Local network

Proxy Client

M

10/20/2011 31

slide-32
SLIDE 32

Mitigating Proxy

10/20/2011 32

slide-33
SLIDE 33

Evaluation

Measurements – Performance: round-trip latency from the client side – Security: leakage bounds in bits

10/20/2011 33

slide-34
SLIDE 34

Experiments with Web Applications

Parameters

– 5-level grace period policy – Doubling scheme – Various request types

  • TYPE/HOST
  • HOST+URLTYPE
  • TYPE/URL

10/20/2011 34

slide-35
SLIDE 35

30%

Experiments with Web Applications

Mitigating department homepage via HTTP

(49 different requests) – Predictive mitigation gains good balance (HOST+URLTYPE)

  • About 30% latency overhead
  • At most 850bits for 100,000 inputs

Performance Security

10/20/2011 35

slide-36
SLIDE 36

Experiments with Web Applications

Mitigating department webmail server via HTTPS

– Secure-sensitive (URL is encrypted) – At most 300 bits for 100,000 inputs – At most 450 bits for 32M inputs (1 input/sec for one year)

Less than 1 second Performance Security

10/20/2011 36

slide-37
SLIDE 37

Related Work

  • Timing mitigation for cryptographic operations [Kocher

96, Kopf & Durmuth 09, Kopf & Smith 10]

– Assumes input blinding

  • NRL Pump/Network Pump [Kang et. al. 93, 96]

– Only address covert channels from input acks – Linear bound

  • Information theory community [Hu 91, Giles&Hajek 02]

– Timing mitigation based on random delays – Linear bound

10/20/2011 37

slide-38
SLIDE 38

Conclusion

Predictive mitigation of timing channels

– Generalized predictive mitigation model

More public information better performance

– General penalty policies & leakage analysis – Composition of mitigated systems – Evaluation suggests this technique is practical

10/20/2011 38