A F RAMEWORK FOR THE A NALYSIS OF M IX -B ASED S TEGANOGRAPHIC F ILE S YSTEMS Claudia Diaz, Carmela Troncoso, Bart Preneel K.U.Leuven / COSIC Cambridge,

Slides:



Advertisements
Similar presentations
Lecture 5: Cryptographic Hashes
Advertisements

Henry C. H. Chen and Patrick P. C. Lee
Efficient Information Retrieval for Ranked Queries in Cost-Effective Cloud Environments Presenter: Qin Liu a,b Joint work with Chiu C. Tan b, Jie Wu b,
Distribution and Revocation of Cryptographic Keys in Sensor Networks Amrinder Singh Dept. of Computer Science Virginia Tech.
Secure In-Band Wireless Pairing Shyamnath Gollakota Nabeel Ahmed Nickolai Zeldovich Dina Katabi.
White-Box Cryptography
Sri Lanka Institute of Information Technology
File Systems.
SEMINAR ON FILE SLACK AND DISK SLACK
Threats to privacy in the forensic analysis of database systems Patrick Stahlberg, Gerome Miklau, and Brian Neil Levine Department of Computer Science.
Fall 2008CS 334: Computer Security1 Crypto Conclusion Message Authentication Codes Key Management.
File System Analysis.
1 Steganographic File Systems Claudia Diaz ESAT/COSIC (K.U.Leuven)
Active Learning and Collaborative Filtering
1 On Protecting Private Information in Social Networks: A Proposal Bo Luo 1 and Dongwon Lee 2 1 The University of Kansas, 2 The Pennsylvania.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Encrypted File System (EFS) Sankara Narayanan. CSE 785 Computer Security, Syracuse University, NY Spring 2003 – 2004.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Cryptography and Network Security Chapter 11. Chapter 11 – Message Authentication and Hash Functions At cats' green on the Sunday he took the message.
Security Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to: –Describe the reasons for having system.
Freenet A Distributed Anonymous Information Storage and Retrieval System I Clarke O Sandberg I Clarke O Sandberg B WileyT W Hong.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Hashing General idea: Get a large array
Cryptography and Network Security Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown/Mod. & S. Kondakci.
Cryptography1 CPSC 3730 Cryptography Chapter 11, 12 Message Authentication and Hash Functions.
File System Security Jason Eick and Evan Nelson. What does a file system do? A file system is a method for storing and organizing computer files and the.
1 Message Authentication and Hash Functions Authentication Requirements Authentication Functions Message Authentication Codes Hash Functions Security of.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Encryption. Introduction Computer security is the prevention of or protection against –access to information by unauthorized recipients –intentional but.
Toward Prevention of Traffic Analysis Fengfeng Tu 11/26/01.
Cryptography Week-6.
On the Anonymity of Anonymity Systems Andrei Serjantov (anonymous)
TRUECRYPT.
Message Authentication  message authentication is concerned with: protecting the integrity of a message protecting the integrity of a message validating.
Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester ITGD 2202 University of Palestine.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
1 Chapter 11: Message Authentication and Hash Functions Fourth Edition by William Stallings Lecture slides by Lawrie Brown (modified by Prof. M. Singhal,
Hash Functions A hash function H accepts a variable-length block of data M as input and produces a fixed-size hash value h = H(M) Principal object is.
The Steganographic File System Ross Anderson, Roger Needlham, Adi Shamir Presented by: Pan Meng Presented by: Pan Meng.
Implementing a Port Knocking System in C Honors Thesis Defense by Matt Doyle.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 Computer Forensics Data Recovery and Evidence Collection September.
Fall 2002CS 395: Computer Security1 Chapter 11: Message Authentication and Hash Functions.
Disclosure risk when responding to queries with deterministic guarantees Krish Muralidhar University of Kentucky Rathindra Sarathy Oklahoma State University.
ISV Innovation Presented by ISV Innovation Presented by Business Intelligence Fundamentals: Data Cleansing Ola Ekdahl IT Mentors 9/12/08.
CS555Spring 2012/Topic 111 Cryptography CS 555 Topic 11: Encryption Modes and CCA Security.
Theory of Computation II Topic presented by: Alberto Aguilar Gonzalez.
11.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 11 Message Integrity and Message Authentication.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
1 Common Secure Index for Conjunctive Keyword-Based Retrieval over Encrypted Data Peishun Wang, Huaxiong Wang, and Josef Pieprzyk: SDM LNCS, vol.
MCSE Guide to Microsoft Windows Vista Professional Chapter 5 Managing File Systems.
Chapter 11 Message Authentication and Hash Functions.
WEP – Wireless Encryption Protocol A. Gabriel W. Daleson CS 610 – Advanced Security Portland State University.
MESSAGE AUTHENTICATION and HASH FUNCTIONS - Chapter 11 MESSAGE AUTHENTICATION and HASH FUNCTIONS - Chapter 11 Masquerade – message insertion, fraud, ACK.
UNIT 5.  The related activities of sorting, searching and merging are central to many computer applications.  Sorting and merging provide us with a.
Cryptography and Network Security (CS435) Part Nine (Message Authentication)
Mix networks with restricted routes PET 2003 Mix Networks with Restricted Routes George Danezis University of Cambridge Computer Laboratory Privacy Enhancing.
Keyword search on encrypted data. Keyword search problem  Linux utility: grep  Information retrieval Basic operation Advanced operations – relevance.
Real-life cryptography Pfeiffer Alain.  Types of PRNG‘s  History  General Structure  User space  Entropy types  Initialization process  Building.
1 Anonymity. 2 Overview  What is anonymity?  Why should anyone care about anonymity?  Relationship with security and in particular identification 
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
PRESENTED BY Raju. What is information security?  Information security is the process of protecting information. It protects its availability, privacy.
The Buffer Cache.
Cryptographic Hash Function
Cryptography Lecture 4.
Cryptography Lecture 4.
Investigating Provably Secure and Practical Software Protection
Threats to Privacy in the Forensic Analysis of Database Systems
Cryptography Lecture 3.
DEFY:A Deniable,Encrypted File System for Log-Structured Storage
Presentation transcript:

A F RAMEWORK FOR THE A NALYSIS OF M IX -B ASED S TEGANOGRAPHIC F ILE S YSTEMS Claudia Diaz, Carmela Troncoso, Bart Preneel K.U.Leuven / COSIC Cambridge, January 28,

M OTIVATION Problem: we want to keep stored information secure (confidential) Encryption protects against the unwanted disclosure of information but… reveals the fact that hidden information exists! User can be threatened / tortured / coerced to disclose the decryption keys (“ coercion attack ”) We need to hide the existence of files Property: plausible deniability Allow users to deny believably that any further encrypted data is located on the storage device If password is not known, not possible to determine the existence of hidden files 2

A TTACKER MODEL : ONE SNAPSHOT Attacker has never inspected the user’s computer before coercion Ability to coerce the user at any point in time User produces some keys Attacker inspects user computer Game: If attacker is able to determine that the user has not provided all her keys, the attacker wins 3

A NDERSON, N EEDHAM & S HAMIR (1998) 1. Use cover files such that a linear combination (XOR) of them reveals the information Password: subset of files to combine Hierarchy (various levels of security) User can show some “low” security levels while hiding “high” security levels Not possible to know whether she has revealed the keys to all existing levels Drawbacks: File read operations have high cost Needs a lot of cover files to be secure (computationally infeasible to try all combinations) Assumes adversary knows nothing about the plaintext 4

A NDERSON, N EEDHAM & S HAMIR (1998) 2. Real files hidden in encrypted form in pseudo- random locations amongst random data Location derived from the name of the file and a password Collisions (birthday paradox) overwrite data: Use only small part of the storage capacity ( < ) Replication All copies of a block need to be overwritten to lose the data Linear hierarchy: higher security levels need more replication 5

S TEG FS: M C D ONALD & K UHN (1999) o Implemented as extension of the Linux file system (Ext2fs) o Hidden files are placed into unused blocks of a “normal” partition o Normal files are overwritten with random data when deleted o Attacker cannot distinguish a deleted normal file from an encrypted hidden file o Block allocation table with one entry per block on the partition: o Used blocks: entry encrypted with same key as data block o Unused blocks: random data o The table helps locating data and detecting corrupted blocks (lower security levels can still overwrite higher ones) 6

What if attacker can observe accesses to the store? Remote or shared semi-trusted store Distributed P2P system Same game as before: o Ability to coerce the user at any point in time o User produces keys to some security levels o Attacker inspects user computer o If attacker is able to determine that the user has not provided all her keys, the attacker wins BUT now the adversary has prior information (which blocks have been accessed/modified) Previous systems do not provide plausible deniability against this adversary model A TTACKER MODEL : CONTINUOUS OBSERVATION 7

P REVIOUS WORK WHERE THIS ADVERSARY IS RELEVANT : P2P Distributed (P2P) steganographic file systems: Mnemosyne: Hand and Roscoe (2002) Mojitos: Giefer and Letchner (2002) Propose dummy traffic to hide access patterns (no details provided) 8

P REVIOUS WORK WHERE THIS ADVERSARY IS RELEVANT : S EMI - TRUSTED REMOTE STORE Semi-trusted remote store: Zhou et al. (2004) Use of constant rate cover traffic (dummy accesses) to disguise file accesses Every time a block location is accessed, it is overwritten with different data (re-encrypted with different IV) Block updates no longer indicate file modifications Every time a file block is accessed, it is moved to another (empty) location Protects against simple access frequency analysis Relocations are low-entropy Broken by Troncoso et al. (2007) with traffic analysis attacks that find correlations between sets of accesses Multi-block files are found prior to coercion if they are accessed twice One-block files are found if accessed a few times 9

H OW IT IS BROKEN ( SIMPLIFIED VERSION ) … … At time t 1 At time t 2 10

Can we provide plausible deniability against an adversary who monitors the store prior to coercion? 11

S YSTEM MODEL Files are stored on fixed-size blocks Blocks containing (encrypted) file data are undistinguishable from empty blocks containing random data Several levels of security (we assume hierarchical) User discloses keys to some of these levels while keeping others hidden Data persistence: erasure codes for redundancy (impact on plausible deniability) Traffic analysis resistance Constant rate dummy traffic High entropy block relocation 12 Process user file requests Generate dummy traffic (uniform)

U SER L OGIN User logs in with security level s, by providing key uk s Agent trial-decrypts every entry in the table Files in security levels s or lower can be found in the table Files in higher security levels are indistinguishable from random (empty) Agent starts making block accesses (either dummy or to retrieve files requested by the user) For each block, the agent performs an access cycle 13 Table

Block containing a file in security level s User key: uk s (One time) block key: bk i Empty block, or containing a file in security level higher than s B LOCK ENCRYPTION 14 data random

A CCESS CYCLE 15 Table

A TTACK METHODOLOGY 1. Attacker profiles the system to extract: Typical access sequences when the user is idle (dummy traffic) Typical access sequences when the user is accessing a file 2. Attacker monitors accesses and looks for sequences that look like file accesses 3. Attacker coerces the user when sequence indicates possible file access (worst case scenario) 4. Attacker obtains some user keys and inspects computer 5. Attacker combines the evidence obtained before and after coercion to try to determine if there are more user keys the user has not provided 6. If the probability of undisclosed keys is high, deniability is low, and vice versa. 16

E XTRACTING INFORMATION FROM THE SEQUENCE OF ACCESSES TO THE STORE I 17 Attacker profiles the system to extract t ypical access sequences when the user is accessing a file MixSFS xxx

E XTRACTING INFORMATION FROM THE SEQUENCE OF ACCESSES TO THE STORE II 18 Attacker profiles the system to extract: Typical access sequences when the user is idle (dummy traffic) Establish a baseline for dummy traffic Analyze accesses to store and find strong correlations (unlikely to be generated by dummy traffic) For big files, the area that goes over the baseline is much bigger than for dummy traffic (i.e., distinguishable)

S ECURITY METRICS : UNOBSERVABILITY Prior to coercion: we define unobservability (U) as the probability of a file operation being undetectable by the adversary; i.e., the sequence of store accesses generated by a file operation is considered by the adversary as dummy traffic 19

S ECURITY METRICS : DENIABILITY 20 After coercion Percentage of empty blocks in pool compared to the percentage in the whole store Worst case scenario: coercion occurs immediately after a hidden file access – large number of “empty” blocks in the pool We define deniability (D) as the probability that the evidence collected by the adversary (before and after coercion) has been generated by dummy traffic (i.e., no evidence of hidden files).

C ONCLUSIONS AND OPEN QUESTIONS Conclusions Hard to protect against traffic analysis, even using constant rate dummy traffic Hard to conceal file accesses with dummy traffic that selects locations uniformly at random When files occupy more blocks, access to them is harder to conceal Open questions More sophisticated pattern recognition algorithms may extract more info from the sequence of accesses Design of smarter traffic analysis strategies Can such a system be implemented in practice? 21

Thank you! 22