Security & Privacy Research at Illinois (SPRAI)
Professor Adam Bates Fall 2018
Security Measurement Professor Adam Bates Fall 2018 Security & - - PowerPoint PPT Presentation
CS 563 - Advanced Computer Security: Security Measurement Professor Adam Bates Fall 2018 Security & Privacy Research at Illinois (SPRAI) Administrative Learning Objectives : Discuss two recent studies that use measurement methods
Security & Privacy Research at Illinois (SPRAI)
Professor Adam Bates Fall 2018
CS423: Operating Systems Design
2
Learning Objectives:
Announcements:
(backlit) devices at the start of class
2
Security & Privacy Research at Illinois (SPRAI) 3
Reports suggest Internet censorship practices are diverse in their methods, targets, timing, differing by regions, as well as across time.
Security & Privacy Research at Illinois (SPRAI)
4
Site user
Problem:
hosts around the world can talk to each other?
Security & Privacy Research at Illinois (SPRAI) 5
Site user
Problem:
hosts around the world can talk to each other? State of the Art:
(RIPE Atlas, OONI probe)
VPNs,
THREE KEY CHALLENGES:
Coverage, ethics, and continuity
Security & Privacy Research at Illinois (SPRAI) 6
Site user
Problem:
hosts around the world can talk to each other?
Impossible!
… from somewhere else in the world??
Security & Privacy Research at Illinois (SPRAI)
7
Site user
Spooky Scan: uses TCP/IP side channels to detect whether a user and a site can communicate (and in which direction packets are blocked). Goal: Detect blocking from off-path
* TCP Idle Scan Antirez, (Bugtraq 1998) * Detecting Intentional Packet Drops on the Internet via TCP/IP Side Channels Roya Ensafi, Knockel, Alexander, and Crandall (PAM ’14) * Idle Port Scanning and Non-interference Analysis of Network Protocol Stacks Using Model Checking Roya Ensafi, Park, Kapur, and Crandall (Usenix Security 2010)
Security & Privacy Research at Illinois (SPRAI)
8
Site user
Augur is a follow up system that uses the same TCP/IP side channels to detect blocking from off-path. Goals: Scalable, ethical, and statistically robust system to continuously detect blocking.
Security & Privacy Research at Illinois (SPRAI)
9
TCP/IP provides several building blocks:
TCP Handshake:
SYN/ACK [IP ID: Y] SYN [IP ID:X] A C K [ I P I D : X + 1 ]
Port status is
SYN-ACK RST
Port status is
SYN SYN/ACK SYN/ACK SYN/ACK
Security & Privacy Research at Illinois (SPRAI)
10
Requirements for each participant:
Site
Open port and retransmitting SYN-ACKs
“User” (Reflector)
Must maintain a global value for IP ID
Measurement Machine
Must be able to spoof packets
Security & Privacy Research at Illinois (SPRAI)
11
Measurement machine Site Reflector
Reflector IP ID
No direction blocked
Security & Privacy Research at Illinois (SPRAI)
12
Measurement machine Site S Y N / A C K
1
Reflector
Reflector IP ID: 7000
No direction blocked
Security & Privacy Research at Illinois (SPRAI)
13
R S T [ I P I D : 7 ] S Y N / A C K Measurement machine
1 2
Reflector Site
Reflector IP ID: 7000
No direction blocked
Security & Privacy Research at Illinois (SPRAI)
14
Reflector IP ID: 7000
S Y N / A C K Measurement machine
1 2 3
Reflector Site Spoofed SYN [src: Reflector IP] R S T [ I P I D : 7 ]
No direction blocked
Security & Privacy Research at Illinois (SPRAI)
15
Reflector IP ID: 7000
S Y N / A C K Measurement machine
1 3
S Y N / A C K R S T [ I P I D : 7 ] S p
e d S Y N [ s r c : R e f l e c t
I P ] Reflector Site
4 2
No direction blocked
Security & Privacy Research at Illinois (SPRAI)
16
Reflector IP ID: 7000 7001
S Y N / A C K Measurement machine
1 2 3 5
Reflector Site RST [IP ID: 7001]
4
S Y N / A C K R S T [ I P I D : 7 ] Spoofed SYN [src: Reflector IP]
No direction blocked
Security & Privacy Research at Illinois (SPRAI)
17
R S T [ I P I D : 7 2 ] S Y N / A C K
6 7
Reflector IP ID: 7000 7001 7002
S Y N / A C K Measurement machine
1 2 3 5
Reflector Site
4
S Y N / A C K R S T [ I P I D : 7 ] S p
e d S Y N [ s r c : R e f l e c t
I P ] R S T [ I P I D : 7 1 ]
No direction blocked
Security & Privacy Research at Illinois (SPRAI)
18
Reflector IP ID: 7000 7001 7002 7003
SYN/ACK
1 2 3 5
Reflector Site
4
SYN/ACK RST [IP ID: 7000] Spoofed SYN [src: Reflector IP] RST [IP ID: 7001]
R S T [ I P I D : 7 2 ] S Y N / A C K
6 7
Probe [IP ID: 7003]
No direction blocked
Security & Privacy Research at Illinois (SPRAI)
19
S Y N / A C K
1 2 3
R S T [ I P I D : 7 1 ] S Y N / A C K
5 6
R S T [ I P I D : 7 ] Spoofed SYN [src: ClientIP] SYN/ACK
4
Reflector IP ID: 7000 7001 7002
Reflector Site Probe [IP ID: 7002]
Site-to-Reflector Blocked
Security & Privacy Research at Illinois (SPRAI)
20
S Y N / A C K Measurement machine
1 2 3
R S T [ I P I D : 7 2 ] S Y N / A C K
6 7
R S T [ I P I D : 7 ] S p
e d S Y N [ s r c : C l i e n t I P ]
Reflector IP ID: 7000 7001 7002
Site
4
SYN/ACK
5
RST
Reflector-to-Site Blocked
Security & Privacy Research at Illinois (SPRAI)
21
Probe [IP ID: 7004] S Y N / A C K Measurement machine
1 2 3
R S T [ I P I D : 7 2 ] S Y N / A C K
6 7
R S T [ I P I D : 7 ] S p
e d S Y N [ s r c : C l i e n t I P ]
Reflector IP ID: 7000 7001 7002
Site
4
SYN/ACK
5
RST
Reflector-to-Site Blocked
Security & Privacy Research at Illinois (SPRAI)
22
No Direction Blocked Site-to-Reflector Blocked Reflector-to-Site Blocked
! IP ID1 = 1 ! IP ID2 = 1 ! IP ID1 = 2 ! IP ID2 = 1 ! IP ID1 = 2 ! IP ID2 = 2
We can use the deltas for each IP packet ID to differentiate blockage:
Security & Privacy Research at Illinois (SPRAI)
23
Reflectors will be making other Internet connections. How to cope?
Reflector
(i.e., N probes instead of 1).
packet loss and other network pathologies.
Security & Privacy Research at Illinois (SPRAI)
24
Not all reflectors will have the same noise levels. How to adjust?
Reflector
Send 10 spoofed SYNs Query IPID
Run
Probing Methodology: Until we have high enough confidence (or up to):
Repeat runs and use Seq. Hypothesis Testing to gradually build confidence.
Security & Privacy Research at Illinois (SPRAI)
25
Defining a Random Variable: Calculate known outcome probabilities:
if no IPID acceleration occurs if IPID acceleration occurs
Prior 1: Prob. of no IPID acceleration when there is blocking Prior 2: Prob. of IPID acceleration when there is no blocking
Based on , can we decide the blocking case? Trial Update
No
Site-to-Ref blocking
Yes
Output Unknown Ref-to-Site blocking No Blocking
No
Maximum Likelihood Ratio
Security & Privacy Research at Illinois (SPRAI)
26
Reflector selection Reflector Characterization Site characterization Scheduler User input
Ref-to-Site blocking — OR — Site-to-Ref blocking — OR — No blocking — OR — Error
System output Target countries Site address Probing Detection/ Validation All responsive IPs
Security & Privacy Research at Illinois (SPRAI)
27
Reflector IP ID: 1000 1001 1002
5
S i t e
4
R e f l e c t
S Y N / A C K R S T [ I P I D : 1 1 ]
Probing banned sites from users’ machines creates risk for user?
Security & Privacy Research at Illinois (SPRAI)
28
Solution: Only probe infrastructure devices.
U s e r
Internet
Global IP ID 22.7 million 236 countries (and dependent territories) Two hops back from end user 53,000 180 countries
Security & Privacy Research at Illinois (SPRAI)
29
Security & Privacy Research at Illinois (SPRAI)
30
One reflector shouldn’t show all sites blocked
Ref-to-site Site-to-Ref/Bidirectional Either
60% of Reflectors experience disruption
Security & Privacy Research at Illinois (SPRAI)
31
Sites shouldn’t be blocked across bulk of reflectors
79% of sites never appear disrupted
Security & Privacy Research at Illinois (SPRAI)
32
There should be bias of blocking towards sensitive sites (CLBL)
95% of reflectors, more than 56.7% of Site-to-Ref is towards CLBL
Ref-to-site (no small ref) Site-to-Ref/Bidirectional (No small ref) Input Dataset CLBL Proportion
Security & Privacy Research at Illinois (SPRAI)
33
Site-to-Reflector blocking
Reflector
Site
Security & Privacy Research at Illinois (SPRAI)
34
Site-to-Reflector blocking
Reflector
Site
Reflector-to-site blocking
R e f l e c t
Site
Security & Privacy Research at Illinois (SPRAI)
35
detection forever?
detect?
Security & Privacy Research at Illinois (SPRAI)
36
require, just when they require it.
their capital investments by multiplexing many customer VMs across a shared physical infrastructure.
providers to respect our private data…
Security & Privacy Research at Illinois (SPRAI)
37
their $$$ by multiplexing the machines in their monstrously large datacenters.
multiplexing the virtual machines of disjoint customers upon the same physical hardware.
server as their adversary?
confidential information?
Security & Privacy Research at Illinois (SPRAI)
38
instances.
even though they are alive and well in the cloud environment.
abilities , implicitly expanding the attack s surfa face of the victim.
1. Casts a wide net in an attempt to attack somebody 2. Focuses on attacking a particular victim service
Security & Privacy Research at Illinois (SPRAI)
39
PLACEMENT of their malicious VM on the same physical machine as that of a target customer.
§ Determine where in the cloud an instance is likely to be located. § Determine if two instances are co-residents. § Intentionally launch an instance to achieve co-residence with another user.
EXTRACT CT information and/or perpetrate all kinds of assorted nastiness.
[Ristenpart et al., CCS’09]
Security & Privacy Research at Illinois (SPRAI)
40
[Ristenpart et al., CCS’09]
: different a availability z zones ( (and p possibly instance t types) a are l likely t to c correspond t to d different i internal IP a address r ranges.
IP address of an instance associated with a public IP through the EC2’s DNS service…
EC2 to determine the instance type and availability zone of their target, dramatically reducing the number of instances needed to achieve co-residence.
“Cloud Cartography”
Security & Privacy Research at Illinois (SPRAI) 41
Limitations of prior work:
patching the side-channels originally used to detect co-residency.
cartography-based approach ineffective
because the map got too big.
[Ristenpart et al., CCS’09]
Security & Privacy Research at Illinois (SPRAI) 42
Novel contributions of this study:
scheduler to infer placement strategy
detection that are more difficult to patch
Security & Privacy Research at Illinois (SPRAI)
43
was as simple as checking dom0 IP address.
shared state channels have been patched.
used L2 cache, i.e., “prime and probe.”
computing; difficult to fix
Security & Privacy Research at Illinois (SPRAI)
44
[Wu et al., Security’12]
VMs can collude to infer their placement.
// allocate memory multiples of 64 bits char_ptr = allocate_memory((N+1)*8) //move half word up unaligned_addr = char_ptr + 2 loop forever: loop i from (1..N): atomic_op(unaligned_addr + i, some_value) end loop end loop
Security & Privacy Research at Illinois (SPRAI)
45
[Bates et al., CCSW’12]
Security & Privacy Research at Illinois (SPRAI)
46
[Bates et al., CCSW’12]
NIC
OUT
Packet Arrivals per Interval
Security & Privacy Research at Illinois (SPRAI) 47
Time F l
e r N e t w
k A c t i v i t y d+ d-
[Bates et al., CCSW’12]
Security & Privacy Research at Illinois (SPRAI) 48
cloud environments.
0.05 0.1 0.15 0.2 0.25 0.3 100 200 300 400 500 600 700 800 Probability Packet Arrivals Per Interval Control Flow Marked Intervals Clear Intervals 0.01 0.02 0.03 0.04 0.05 0.06 0.07 500 1000 1500 2000 2500 3000 3500 Probability Packet Arrivals Per Interval Control Flow Marked Intervals Clear Intervals
Packet Arrivals Per Interval Packet Arrivals Per Interval Probability Probability
[Bates et al., CCSW’12]
Security & Privacy Research at Illinois (SPRAI)
49
If a truly random placement policy was used…
VMs and a attacker VMs
Pc = 1 – (1 – v
N)a
Security & Privacy Research at Illinois (SPRAI)
50
VMs, delay b/w launches, time of day, day of week, datacenter, cloud provider Small instance type
(weekday/weekend).
Security & Privacy Research at Illinois (SPRAI)
51
Co-location is possible with as low as 10 VMs and always achieve co-location with 30 VMs
Security & Privacy Research at Illinois (SPRAI)
52
Different clouds have wildly different temporal placement strategies
Security & Privacy Research at Illinois (SPRAI)
53
Successful co-location as affordable as 14 cents.
Security & Privacy Research at Illinois (SPRAI)
54
S&P a.k.a. Oakland, USENIX Security, CCS, NDSS) and also major network conferences (e.g., IMC, SIGCOMM).
better understand the state of security in the real world.
source projects)