Revisiting Leakage Abuse Attacks
Tarik Moataz
AROKI SYSTEMS
Seny Kamara Laura Blackstone
Revisiting Leakage Abuse Attacks Laura Blackstone Seny Kamara - - PowerPoint PPT Presentation
Revisiting Leakage Abuse Attacks Laura Blackstone Seny Kamara Tarik Moataz AROKI SYSTEMS Encrypted Search Trusted client Untrusted server Cat Fish Cat Dog Dog 2 Encrypted Search Cat Fish Encrypted Trusted client Cat Untrusted
Tarik Moataz
AROKI SYSTEMS
Seny Kamara Laura Blackstone
Encrypted Search
2Trusted client
Cat Fish Dog Dog CatUntrusted server
Encrypted Search
3Untrusted server Trusted client
Encrypted Index
Cat Fish Dog Dog CatSecret key
Encrypted Search
3Untrusted server Trusted client
Encrypted Index
Cat
Cat Fish Dog Dog CatSecret key
Encrypted Search
3Untrusted server Trusted client
Encrypted Index
Cat
Cat Fish Dog Dog Cat Dog Cat CatSecret key
Untrusted server Trusted client
Encrypted Index
Cat
Cat Fish Dog Dog Cat Dog Cat CatSecret key
Encrypted Search
Untrusted server Trusted client
Encrypted Index
Cat
Cat Fish Dog Dog Cat Dog Cat CatSecret key
Setup Leakage
LS
Encrypted Search
Untrusted server Trusted client
Encrypted Index
Cat
Cat Fish Dog Dog Cat Dog Cat CatSecret key
Setup Leakage
LS
Query Leakage
LQ
Encrypted Search
Query Leakage Terminology
Encrypted Search
Primitives
Property-Preserving Encryption (PPE) Fully-Homomorphic Encryption (FHE) Functional Encryption Oblivious RAM (ORAM) Structured Encryption (STE)
Encrypted Search
Primitives
Property-Preserving Encryption (PPE) Fully-Homomorphic Encryption (FHE) Functional Encryption Oblivious RAM (ORAM) Structured Encryption (STE)
Encrypted Search
STE- & ORAM- based schemes
rid vol co-occ qeq tvol rlen
Baseline STE
8Encrypted Search
STE- & ORAM- based schemes
rid vol co-occ qeq tvol rlen
Baseline STE Semi-ORAM
8Encrypted Search
STE- & ORAM- based schemes
rid vol co-occ qeq tvol rlen
Baseline STE Semi-ORAM OPQ STE [this work]
8Encrypted Search
STE- & ORAM- based schemes
rid vol co-occ qeq tvol rlen
Baseline STE Semi-ORAM OPQ STE [this work] Full ORAM
8Encrypted Search
STE- & ORAM- based schemes
rid vol co-occ qeq tvol rlen
Leakage Attacks
Leakage Attack
One or more leakage pattern Input
Assumptions User’s query or data recovery Output
Leakage Attacks
Assumptions
Leakage Attacks
Assumptions
Leakage Attacks
Assumptions
Leakage Attacks
Assumptions
Leakage Attacks
IKK Attack [Islam-Kuzu-Kantarcioglu12]
IKK Attack
co-occ Input Query recovery Output
Leakage Attacks
IKK Attack [Islam-Kuzu-Kantarcioglu12]
IKK Attack
co-occ Input
Assumptions Query recovery Output
Leakage Attacks
IKK Attack [Islam-Kuzu-Kantarcioglu12]
IKK Attack
co-occ Input
Assumptions Query recovery Output Vulnerable schemes
Leakage Attacks
Count Attack [Cash-Grubbs-Perry-Ristenpart15]
Count Attack
co-occ + rlen Input Query recovery Output
Leakage Attacks
Count Attack [Cash-Grubbs-Perry-Ristenpart15]
Count Attack
co-occ + rlen Input
Assumptions Query recovery Output
Leakage Attacks
Count Attack [Cash-Grubbs-Perry-Ristenpart15]
Count Attack
co-occ + rlen Input
Assumptions Query recovery Output Vulnerable schemes
email repository, an adversary can infer as much as 80% of the search queries”
information such as encryption keys [IKK]”
pattern leakage can be used to recover significant information about data in encrypted indices. For example, some attacks can recover all search queries [Count,…] …”
14Impact of IKK & Count
A closer look at IKK & Count attacks
15Non-trivial limitations
High- selectivity Pseudo-low selectivity Low selectivity
0.05 0.1 0.15 0.2 2000 4000 6000 8000 10000 Frequency Keywords rank SU dataset M-MU dataset L-MU dataset(1-2) (10-13) (≥ 13)
Summary of our Attacks
Known-Data attacks
Summary of our Attacks
Known-Data attacks
SubgrapID Attack
rid
Query recovery
Summary of our Attacks
Known-Data attacks
SubgrapID Attack
rid
Query recovery
Vulnerable schemes
Summary of our Attacks
Known-Data attacks
SubgrapID Attack
rid
Query recovery
Vulnerable schemes
SubgraphVL Attack
vol
Query recovery
Summary of our Attacks
Known-Data attacks
SubgrapID Attack
rid
Query recovery
Vulnerable schemes
SubgraphVL Attack
vol
Query recovery
VolAn & SelVolAn Attacks
tvol
Query recovery
Summary of our Attacks
Injection attacks
Decoding & Binary attacks
tvol
Query recovery
Vulnerable schemes
First injection attack was by [Zhang-Katz-Papamanthou16] and works against Baseline STE and Semi-ORAM
The SubgraphVL Attack
20The SubgraphVL Attack
The SubgraphVL Attack
vol(K2) vol(K4) w1 w4 w5 Known Graph
The SubgraphVL Attack
vol(K2) vol(K4) w1 w4 w5 Known Graph vol(D1) vol(D2) vol(D3) vol(D4) q1 q2 q3 q4 q5 Observed Graph
The SubgraphVL Attack
vol(D1) vol(D2) vol(D3) vol(D4) vol(K2) vol(K4) w1 w4 w5 Observed Graph Known Graph q1 q2 q3 q4 q5
The SubgraphVL Attack
vol(D1) vol(D2) vol(D3) vol(D4) q1 q2 q3 q4 q5 vol(K2) vol(K4) w1 w4 w5 Observed Graph Known Graph
The SubgraphVL Attack
24Observed Graph Known Graph
N(w4) = N(w5) = N(w1) = N(q1) = N(q2) = N(q3) = N(q4) = N(q5) =
C(q1) ={w4,w5,w1}
C(q4) = {w4,w5,w1} C(q5) ={w4,w5,w1}
Candidate Sets
The SubgraphVL Attack
24Observed Graph Known Graph
N(w4) = N(w5) = N(w1) = N(q1) = N(q2) = N(q3) = N(q4) = N(q5) =
C(q1) ={w4,w5,w1}
C(q4) = {w4,w5,w1} C(q5) ={w4,w5,w1}
Candidate Sets
C(q1) ={w1}
The SubgraphVL Attack
24Observed Graph Known Graph
N(w4) = N(w5) = N(w1) = N(q1) = N(q2) = N(q3) = N(q4) = N(q5) =
C(q1) ={w4,w5,w1}
C(q4) = {w4,w5,w1} C(q5) ={w4,w5,w1}
Candidate Sets
C(q1) ={w1} C(q4) = {w4}
The SubgraphVL Attack
24Observed Graph Known Graph
N(w4) = N(w5) = N(w1) = N(q1) = N(q2) = N(q3) = N(q4) = N(q5) =
C(q1) ={w4,w5,w1}
C(q4) = {w4,w5,w1} C(q5) ={w4,w5,w1}
Candidate Sets
C(q1) ={w1} C(q4) = {w4} C(q5) ={w4,w5,w1}
Observed Graph Known Graph
N(w4) = N(w5) = N(w1) = N(q1) = N(q2) = N(q3) = N(q4) = N(q5) =
C(q1) ={w1} C(q4) = {w4} C(q5) ={w4,w5,w1}
Candidate Sets
The SubgraphVL Attack
Observed Graph Known Graph
N(w4) = N(w5) = N(w1) = N(q1) = N(q2) = N(q3) = N(q4) = N(q5) =
C(q1) ={w1} C(q4) = {w4} C(q5) ={w4,w5,w1}
Candidate Sets
The SubgraphVL Attack
Observed Graph Known Graph
N(w4) = N(w5) = N(w1) = N(q1) = N(q2) = N(q3) = N(q4) = N(q5) =
C(q1) ={w1} C(q4) = {w4} C(q5) ={w4,w5,w1}
Candidate Sets
The SubgraphVL Attack
Observed Graph Known Graph
N(w4) = N(w5) = N(w1) = N(q1) = N(q2) = N(q3) = N(q4) = N(q5) =
C(q1) ={w1} C(q4) = {w4} C(q5) ={w4,w5,w1}
Candidate Sets
The SubgraphVL Attack
Observed Graph Known Graph
N(w4) = N(w5) = N(w1) = N(q1) = N(q2) = N(q3) = N(q4) = N(q5) =
C(q1) ={w1} C(q4) = {w4} C(q5) ={w4,w5,w1}
Candidate Sets
The SubgraphVL Attack
Evaluation of our Attacks
Setting
26High-selectivity Low selectivity
Evaluation of our Attacks
Single User - 500 Keywords - Entire composition
High-selectivity Low selectivity δ < 20%
Evaluation of our Attacks
Single User - 500 Keywords - Entire composition
Summary of our Attacks
Against Enron Dataset
28Attack Type Pattern Known Queries
δ for HS
δ for PLS δ for LS IKK known-data co Yes ≥95% ? ? Count known-data rlen Yes/No ≥80% ? ? ZKP injection rid No N/A N/A N/A SubgrapID known-data rid No ≥5% ≥50% ≥60% SubgraphVL known-data vol No ≥5% ≥50%
δ=1
recovers<10% VolAn known-data tvol No ≥85% ≥85%
δ=1
recovers<10% SelVolAn known-data tvol, rlen No ≥80% ≥85%
δ=1
recovers<10% Decoding injection tvol No N/A N/A N/A Binary injection Tvol No N/A N/A N/A
δ needed for RR ≥ 20%
Very theoretical Theoretical Practical
Takeaways
https://eprint.iacr.org/2019/1175