Security Measurement Professor Adam Bates Fall 2018 Security & - - PowerPoint PPT Presentation

security measurement
SMART_READER_LITE
LIVE PREVIEW

Security Measurement Professor Adam Bates Fall 2018 Security & - - PowerPoint PPT Presentation

CS 563 - Advanced Computer Security: Security Measurement Professor Adam Bates Fall 2018 Security & Privacy Research at Illinois (SPRAI) Administrative Learning Objectives : Discuss two recent studies that use measurement methods


slide-1
SLIDE 1

Security & Privacy Research at Illinois (SPRAI)

Professor Adam Bates Fall 2018

CS 563 - Advanced Computer Security:

Security Measurement

slide-2
SLIDE 2

CS423: Operating Systems Design

Administrative

2

Learning Objectives:

  • Discuss two recent studies that use measurement methods
  • Survey broad topics in the “security measurement” area

Announcements:

  • Reaction paper was due today (and all classes)
  • Feedback for reaction papers soon
  • “Preference Proposal” Homework due 9/24
  • Reminder: Please put away

(backlit) devices at the start of class

2

slide-3
SLIDE 3

Security & Privacy Research at Illinois (SPRAI) 3

Reports suggest Internet censorship practices are diverse in their methods, targets, timing, differing by regions, as well as across time.

Measuring Internet Censorship

slide-4
SLIDE 4

Security & Privacy Research at Illinois (SPRAI)

Measuring Internet Censorship

4

?

Site user

Problem:

  • How can we detect whether pairs of

hosts around the world can talk to each other?

slide-5
SLIDE 5

Security & Privacy Research at Illinois (SPRAI) 5

?

Site user

Problem:

  • How can we detect whether pairs of

hosts around the world can talk to each other? State of the Art:

  • Deploy hardware or software at hosts

(RIPE Atlas, OONI probe)

  • Ask people on the ground, or use

VPNs,

  • r research networks (PlanetLab)

Measuring Internet Censorship

THREE KEY CHALLENGES:

Coverage, ethics, and continuity

slide-6
SLIDE 6

Security & Privacy Research at Illinois (SPRAI) 6

?

Site user

Measuring Internet Censorship

Problem:

  • How can we detect whether pairs of

hosts around the world can talk to each other?

Impossible!

… from somewhere else in the world??

slide-7
SLIDE 7

Security & Privacy Research at Illinois (SPRAI)

Hybrid Idle (Spooky) Scan

7

? ?

Site user

Spooky Scan: uses TCP/IP side channels to detect whether a user and a site can communicate (and in which direction packets are blocked). Goal: Detect blocking from off-path

* TCP Idle Scan Antirez, (Bugtraq 1998) * Detecting Intentional Packet Drops on the Internet via TCP/IP Side Channels Roya Ensafi, Knockel, Alexander, and Crandall (PAM ’14) * Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking Roya Ensafi, Park, Kapur, and Crandall (Usenix Security 2010)

slide-8
SLIDE 8

Security & Privacy Research at Illinois (SPRAI)

Hybrid Idle (Spooky) Scan

8

? ?

Site user

Augur is a follow up system that uses the same TCP/IP side channels to detect blocking from off-path. Goals: Scalable, ethical, and statistically robust system to continuously detect blocking.

slide-9
SLIDE 9

Security & Privacy Research at Illinois (SPRAI)

How does this work?

9

TCP/IP provides several building blocks:

TCP Handshake:

SYN/ACK [IP ID: Y] SYN [IP ID:X] A C K [ I P I D : X + 1 ]

Port status is

  • pen/closed

SYN-ACK RST

Port status is

  • pen

SYN SYN/ACK SYN/ACK SYN/ACK

slide-10
SLIDE 10

Security & Privacy Research at Illinois (SPRAI)

How does this work?

10

Requirements for each participant:

Site

Open port and retransmitting SYN-ACKs

“User” (Reflector)

Must maintain a global value for IP ID

Measurement Machine

Must be able to spoof packets

slide-11
SLIDE 11

Security & Privacy Research at Illinois (SPRAI)

Spooky Scans

11

Measurement machine Site Reflector

Reflector IP ID

No direction blocked

slide-12
SLIDE 12

Security & Privacy Research at Illinois (SPRAI)

Spooky Scans

12

Measurement machine Site S Y N / A C K

1

Reflector

Reflector IP ID: 7000

No direction blocked

slide-13
SLIDE 13

Security & Privacy Research at Illinois (SPRAI)

Spooky Scans

13

R S T [ I P I D : 7 ] S Y N / A C K Measurement machine

1 2

Reflector Site

Reflector IP ID: 7000

No direction blocked

slide-14
SLIDE 14

Security & Privacy Research at Illinois (SPRAI)

Spooky Scans

14

Reflector IP ID: 7000

S Y N / A C K Measurement machine

1 2 3

Reflector Site Spoofed SYN [src: Reflector IP] R S T [ I P I D : 7 ]

No direction blocked

slide-15
SLIDE 15

Security & Privacy Research at Illinois (SPRAI)

Spooky Scans

15

Reflector IP ID: 7000

S Y N / A C K Measurement machine

1 3

S Y N / A C K R S T [ I P I D : 7 ] S p

  • f

e d S Y N [ s r c : R e f l e c t

  • r

I P ] Reflector Site

4 2

No direction blocked

slide-16
SLIDE 16

Security & Privacy Research at Illinois (SPRAI)

Spooky Scans

16

Reflector IP ID: 7000 7001

S Y N / A C K Measurement machine

1 2 3 5

Reflector Site RST [IP ID: 7001]

4

S Y N / A C K R S T [ I P I D : 7 ] Spoofed SYN [src: Reflector IP]

No direction blocked

slide-17
SLIDE 17

Security & Privacy Research at Illinois (SPRAI)

Spooky Scans

17

R S T [ I P I D : 7 2 ] S Y N / A C K

6 7

Reflector IP ID: 7000 7001 7002

S Y N / A C K Measurement machine

1 2 3 5

Reflector Site

4

S Y N / A C K R S T [ I P I D : 7 ] S p

  • f

e d S Y N [ s r c : R e f l e c t

  • r

I P ] R S T [ I P I D : 7 1 ]

No direction blocked

slide-18
SLIDE 18

Security & Privacy Research at Illinois (SPRAI)

Spooky Scans

18

Reflector IP ID: 7000 7001 7002 7003

SYN/ACK

1 2 3 5

Reflector Site

4

SYN/ACK RST [IP ID: 7000] Spoofed SYN [src: Reflector IP] RST [IP ID: 7001]

R S T [ I P I D : 7 2 ] S Y N / A C K

6 7

Probe [IP ID: 7003]

No direction blocked

slide-19
SLIDE 19

Security & Privacy Research at Illinois (SPRAI)

Spooky Scans

19

S Y N / A C K

1 2 3

R S T [ I P I D : 7 1 ] S Y N / A C K

5 6

R S T [ I P I D : 7 ] Spoofed SYN [src: ClientIP] SYN/ACK

4

Reflector IP ID: 7000 7001 7002

Reflector Site Probe [IP ID: 7002]

Site-to-Reflector Blocked

slide-20
SLIDE 20

Security & Privacy Research at Illinois (SPRAI)

Spooky Scans

20

S Y N / A C K Measurement machine

1 2 3

R S T [ I P I D : 7 2 ] S Y N / A C K

6 7

R S T [ I P I D : 7 ] S p

  • f

e d S Y N [ s r c : C l i e n t I P ]

Reflector IP ID: 7000 7001 7002

Site

4

SYN/ACK

5

RST

Reflector-to-Site Blocked

slide-21
SLIDE 21

Security & Privacy Research at Illinois (SPRAI)

Spooky Scans

21

Probe [IP ID: 7004] S Y N / A C K Measurement machine

1 2 3

R S T [ I P I D : 7 2 ] S Y N / A C K

6 7

R S T [ I P I D : 7 ] S p

  • f

e d S Y N [ s r c : C l i e n t I P ]

Reflector IP ID: 7000 7001 7002

Site

4

SYN/ACK

5

RST

Reflector-to-Site Blocked

slide-22
SLIDE 22

Security & Privacy Research at Illinois (SPRAI)

Spooky Scans

22

No Direction Blocked Site-to-Reflector Blocked Reflector-to-Site Blocked

! IP ID1 = 1 ! IP ID2 = 1 ! IP ID1 = 2 ! IP ID2 = 1 ! IP ID1 = 2 ! IP ID2 = 2

We can use the deltas for each IP packet ID to differentiate blockage:

slide-23
SLIDE 23

Security & Privacy Research at Illinois (SPRAI)

What about noise?

23

Reflectors will be making other Internet connections. How to cope?

Reflector

  • Amplify the signal by repeated probing

(i.e., N probes instead of 1).

  • Repeat the experiment to account for

packet loss and other network pathologies.

slide-24
SLIDE 24

Security & Privacy Research at Illinois (SPRAI)

What about noise?

24

Not all reflectors will have the same noise levels. How to adjust?

Reflector

  • For first 4s, query IPID every sec
  • Query IPID

Send 10 spoofed SYNs Query IPID

Run

Probing Methodology: Until we have high enough confidence (or up to):

Repeat runs and use Seq. Hypothesis Testing to gradually build confidence.

slide-25
SLIDE 25

Security & Privacy Research at Illinois (SPRAI)

Sequential Hypothesis Testing

25

Defining a Random Variable: Calculate known outcome probabilities:

if no IPID acceleration occurs if IPID acceleration occurs

Prior 1: Prob. of no IPID acceleration when there is blocking Prior 2: Prob. of IPID acceleration when there is no blocking

Based on , can we decide the blocking case? Trial Update

No

Site-to-Ref blocking

Yes

Output Unknown Ref-to-Site blocking No Blocking

No

Maximum Likelihood Ratio

slide-26
SLIDE 26

Security & Privacy Research at Illinois (SPRAI)

Augur Framework

26

Reflector selection Reflector Characterization Site characterization Scheduler User input

Ref-to-Site blocking — OR — Site-to-Ref blocking — OR — No blocking — OR — Error

System output Target countries Site address Probing Detection/ Validation All responsive IPs

slide-27
SLIDE 27

Security & Privacy Research at Illinois (SPRAI)

Ethical Considerations

27

Reflector IP ID: 1000 1001 1002

5

S i t e

4

R e f l e c t

  • r

S Y N / A C K R S T [ I P I D : 1 1 ]

Probing banned sites from users’ machines creates risk for user?

slide-28
SLIDE 28

Security & Privacy Research at Illinois (SPRAI)

Ethical Considerations

28

Solution: Only probe infrastructure devices.

U s e r

Internet

Global IP ID 22.7 million 236 countries (and dependent territories) Two hops back from end user 53,000 180 countries

slide-29
SLIDE 29

Security & Privacy Research at Illinois (SPRAI)

Measurement Study

29

  • 2,050 Reflectors
  • 2,134 sites (Citizen Lab list + Alexa Top-10K)
  • 47 Measurements per site per reflector
  • 207,600,000 measurements total
  • How do we know Augur is working correctly?
slide-30
SLIDE 30

Security & Privacy Research at Illinois (SPRAI)

Validation Checks

30

One reflector shouldn’t show all sites blocked


  • 99% of reflectors experience disruption only for 20 or fewer website

Ref-to-site Site-to-Ref/Bidirectional Either

60% of Reflectors experience disruption

slide-31
SLIDE 31

Security & Privacy Research at Illinois (SPRAI)

Validation Checks

31

Sites shouldn’t be blocked across bulk of reflectors

  • Over 99% of sites exhibit blocking by 100 reflectors (5%) or less

79% of sites never appear disrupted

slide-32
SLIDE 32

Security & Privacy Research at Illinois (SPRAI)

Validation Checks

32

There should be bias of blocking towards sensitive sites (CLBL)

  • For 99% of reflectors, more than 56.7% of Site-to-Ref is towards CLBL

95% of reflectors, more than 56.7% of Site-to-Ref is towards CLBL

Ref-to-site (no small ref) Site-to-Ref/Bidirectional (No small ref) Input Dataset CLBL Proportion

slide-33
SLIDE 33

Security & Privacy Research at Illinois (SPRAI)

Results

33

Site-to-Reflector blocking

Reflector

Site

slide-34
SLIDE 34

Security & Privacy Research at Illinois (SPRAI)

Results

34

Site-to-Reflector blocking

Reflector

Site

Reflector-to-site blocking

R e f l e c t

  • r

Site

slide-35
SLIDE 35

Security & Privacy Research at Illinois (SPRAI)

Questions

35

  • Thoughts on Augur?
  • Has Augur enabled Internet-wide censorship

detection forever?

  • How could censors evade Augur?
  • Are there kinds of censorship Augur can’t

detect?

  • Is Augur ethical?
slide-36
SLIDE 36

Security & Privacy Research at Illinois (SPRAI)

Cloud Computing

36

  • Third-party cloud computing represents the promise
  • f outsourced computation.
  • It allows customers to purchase just the capacity they

require, just when they require it.

  • Cloud providers are able to maximize utilization of

their capital investments by multiplexing many customer VMs across a shared physical infrastructure.

  • It is a given that we need to be able to trust cloud

providers to respect our private data…

slide-37
SLIDE 37

Security & Privacy Research at Illinois (SPRAI)

… can we trust other users?

37

  • We already know that 3rd Party cloud providers make

their $$$ by multiplexing the machines in their monstrously large datacenters.

  • Cloud computing creates threats of multi-tenancy,

multiplexing the virtual machines of disjoint customers upon the same physical hardware.

  • Could a customer be assigned to the same physical

server as their adversary?

  • Could the adversary exploit co-residency to extract

confidential information?

slide-38
SLIDE 38

Security & Privacy Research at Illinois (SPRAI)

Co-Residency Threat Model

38

  • We trust the provider, its infrastructure and its employees.
  • Adversaries are non-provider-affiliated malicious parties.
  • Victims are running confidentiality-requiring services in the cloud.
  • Everyone is a customer; both groups can all run and control many

instances.

  • We are not concerned with traditional threats and exploits here,

even though they are alive and well in the cloud environment.

  • 3rd Party Cloud Providers give attackers novel a

abilities , implicitly expanding the attack s surfa face of the victim.

  • Two kinds of attackers

1. Casts a wide net in an attempt to attack somebody 2. Focuses on attacking a particular victim service

slide-39
SLIDE 39

Security & Privacy Research at Illinois (SPRAI)

Hey! You! Get Off of My Cloud!

39

  • 1. Use Amazon EC2 as a case study.
  • U.S. Region
  • Linux Kernel
  • 2. Achieve PL

PLACEMENT of their malicious VM on the same physical machine as that of a target customer.

§ Determine where in the cloud an instance is likely to be located. § Determine if two instances are co-residents. § Intentionally launch an instance to achieve co-residence with another user.

  • 3. Proceed to EX

EXTRACT CT information and/or perpetrate all kinds of assorted nastiness.

[Ristenpart et al., CCS’09]

slide-40
SLIDE 40

Security & Privacy Research at Illinois (SPRAI)

Hey! You! Get Off of My Cloud!

40

[Ristenpart et al., CCS’09]

  • Hypothesis: d

: different a availability z zones ( (and p possibly instance t types) a are l likely t to c correspond t to d different i internal IP a address r ranges.

  • Since we already know that it’s possible to infer the internal

IP address of an instance associated with a public IP through the EC2’s DNS service…

  • If this hypothesis holds, an adversary can use a map of

EC2 to determine the instance type and availability zone of their target, dramatically reducing the number of instances needed to achieve co-residence.

“Cloud Cartography”

slide-41
SLIDE 41

Security & Privacy Research at Illinois (SPRAI) 41

Limitations of prior work:

  • Focused exclusively on Amazon EC2
  • New countermeasures, including

patching the side-channels originally used to detect co-residency.

  • Increased scale of cloud — makes cloud

cartography-based approach ineffective

because the map got too big.

Hey! You! Get Off of My Cloud!

[Ristenpart et al., CCS’09]

slide-42
SLIDE 42

Security & Privacy Research at Illinois (SPRAI) 42

Novel contributions of this study:

  • Performs black box testing of cloud

scheduler to infer placement strategy

  • Enables intelligent attack strategy
  • Presents new methods for co-residency

detection that are more difficult to patch

[Varadarajan et al., Security’15]

slide-43
SLIDE 43

Security & Privacy Research at Illinois (SPRAI)

Co-Residency Detection

43

  • Worked well in early days;

was as simple as checking dom0 IP address.

  • Less common now; many

shared state channels have been patched.

  • Early effective techniques

used L2 cache, i.e., “prime and probe.”

  • Sharing is intrinsic to cloud

computing; difficult to fix

slide-44
SLIDE 44

Security & Privacy Research at Illinois (SPRAI)

Cooperative Detection

44

[Wu et al., Security’12]

  • In one class of co-residency detection schemes,

VMs can collude to infer their placement.

  • (Works well for measurement studies but not attacks)
  • Wu et al.’s memory locking covert channel does the trick!

// allocate memory multiples of 64 bits char_ptr = allocate_memory((N+1)*8) //move half word up unaligned_addr = char_ptr + 2 loop forever: loop i from (1..N): atomic_op(unaligned_addr + i, some_value) end loop end loop

slide-45
SLIDE 45

Security & Privacy Research at Illinois (SPRAI)

Cooperative Detection

45

  • What about on an un-cooperative (victim) VM?
  • One possibility — embed a beacon into network activity!

[Bates et al., CCSW’12]

slide-46
SLIDE 46

Security & Privacy Research at Illinois (SPRAI)

Co-Resident Watermarking

46

[Bates et al., CCSW’12]

Colluding VM: “Flooder”

NIC

Colluding Host: “Client”

OUT

  • OF-BAND SIGNAL

Victim VM: “Server”

Packet Arrivals per Interval

slide-47
SLIDE 47

Security & Privacy Research at Illinois (SPRAI) 47

Time F l

  • d

e r N e t w

  • r

k A c t i v i t y d+ d-

Co-Resident Watermarking

[Bates et al., CCSW’12]

slide-48
SLIDE 48

Security & Privacy Research at Illinois (SPRAI) 48

Co-Resident Watermarking

  • Co-resident watermarking is a viable attack in production

cloud environments.

ACISS (KVM) Futuregrid (Xen)

0.05 0.1 0.15 0.2 0.25 0.3 100 200 300 400 500 600 700 800 Probability Packet Arrivals Per Interval Control Flow Marked Intervals Clear Intervals 0.01 0.02 0.03 0.04 0.05 0.06 0.07 500 1000 1500 2000 2500 3000 3500 Probability Packet Arrivals Per Interval Control Flow Marked Intervals Clear Intervals

Packet Arrivals Per Interval Packet Arrivals Per Interval Probability Probability

[Bates et al., CCSW’12]

slide-49
SLIDE 49

Security & Privacy Research at Illinois (SPRAI)

How hard *should* it be to co-locate?

49

If a truly random placement policy was used…

  • N = 50,000 machines
  • v victim

VMs and a attacker VMs

  • Probability of Collision:

Pc = 1 – (1 – v

N)a

slide-50
SLIDE 50

Security & Privacy Research at Illinois (SPRAI)

Placement Study

50

  • 6 placement variables: # victim & attacker

VMs, delay b/w launches, time of day, day of week, datacenter, cloud provider Small instance type

  • 9 samples per strategy with 3 runs per time of day and 2 days of week

(weekday/weekend).

slide-51
SLIDE 51

Security & Privacy Research at Illinois (SPRAI)

Variable # of VMs

51

Co-location is possible with as low as 10 VMs and always achieve co-location with 30 VMs

slide-52
SLIDE 52

Security & Privacy Research at Illinois (SPRAI)

Variable Delay between launches

52

Different clouds have wildly different temporal placement strategies

slide-53
SLIDE 53

Security & Privacy Research at Illinois (SPRAI)

Attack Cost

53

Successful co-location as affordable as 14 cents.

slide-54
SLIDE 54

Security & Privacy Research at Illinois (SPRAI)

Measurement: Looking Forward

54

  • Where to look for literature: “Big 4” security conferences (IEEE

S&P a.k.a. Oakland, USENIX Security, CCS, NDSS) and also major network conferences (e.g., IMC, SIGCOMM).

  • Big Idea of measurement-based methodologies: Help us to

better understand the state of security in the real world.

  • Hot Topics in Measurement (not exhaustive):
  • Internet Ecosystem (e.g., TLS, HTTPS adoption, CDNs, DNS, Advertising)
  • Cloud Computing (e.g., side channels)
  • Software Development (e.g., longitudinal measurement of bugs in open

source projects)

  • Malware, Spam, Botnets