Rui Wang, XiaoFeng Wang and Kehuan Zhang Shuo Chen IEEE Symposium on Security and Privacy Oakland, California May 17 th, 2010.

Slides:



Advertisements
Similar presentations
Rob Smets A user centred approach IPv6 deployment monitoring.
Advertisements

CCNA – Network Fundamentals
Back to Table of Contents
Peeking into Your App without Actually Seeing It: UI State Inference and Novel Android Attacks Qi Alfred Chen, Zhiyun Qian†, Z. Morley Mao University of.
1 Steve Chenoweth Friday, 10/21/11 Week 7, Day 4 Right – Good or bad policy? – Asking the user what to do next! From malware.net/how-to-remove-protection-system-
 Guarantee that EK is safe  Yes because it is stored in and used by hw only  No because it can be obtained if someone has physical access but this can.
16 Money Management and Financial Planning
Secure Shell – SSH Tam Ngo Steve Licking cs265. Overview Introduction Brief History and Background of SSH Differences between SSH-1 and SSH- 2 Brief Overview.
EEC-484/584 Computer Networks Lecture 6 Wenbing Zhao
EECS Presentation Web Tap: Intelligent Intrusion Detection Kevin Borders.
Web Servers How do our requests for resources on the Internet get handled? Can they be located anywhere? Global?
1 Chapter 4 – Tax Planning Intent – not to make you tax experts –But appreciate major features of tax laws Key concepts – deductions and sheltered income.
Security Issues in Web Applications Vitaly Shmatikov CS 6431.
Building Bucks Taxes and Tax Credits. Take advantage of tax deductions and incentives – Earned Income Tax Credit (EITC) – Child Tax Credit (CTC) Refund.
1 Enabling Secure Internet Access with ISA Server.
KaZaA: Behind the Scenes Shreeram Sahasrabudhe Lehigh University
Agribusiness Library LESSON L060056: FEDERAL AND STATE INCOME TAXES.
Prof. Vishnuprasad Nagadevara Indian Institute of Management Bangalore
September 2013 HEALTH SAVINGS ACCOUNTS OUR PLAN AND ITS BENEFITS FOR EMPLOYEES.
On the Anonymity of Anonymity Systems Andrei Serjantov (anonymous)
Copyright ©2004 Pearson Education, Inc. All rights reserved. Chapter 4 Using Tax Concepts for Planning.
*2011 IRS forms are displayed in this chapter because 2012 forms were not available at the time of main text publication IRS forms can be obtained.
Signatures As Threats to Privacy Brian Neil Levine Assistant Professor Dept. of Computer Science UMass Amherst.
1 3 Web Proxies Web Protocols and Practice. 2 Topics Web Protocols and Practice WEB PROXIES  Web Proxy Definition  Three of the Most Common Intermediaries.
© Paradigm Publishing, Inc. 5-1 Chapter 5 Application Software Chapter 5 Application Software.
Delight QuickBooks Online Banking Internal Support Training QuickBooks Windows 2009/2010 Online Banking.
Presents A College Expense Reduction Program FreedomFinancial-AZ.com &
Personal Finance Test Review. Post Test Review A. Credit is the ability to obtain goods/services before payment is made based on the trust that payment.
©2010 John Wiley and Sons Chapter 12 Research Methods in Human-Computer Interaction Chapter 12- Automated Data Collection.
1 OPOL Training (OrderPro Online) Prepared by Christina Van Metre Independent Educational Consultant CTO, Business Development Team © Training Version.
Financial Planning Financial Planning An Introduction to the Financial Planning Process An Introduction to the Financial Planning Process Presented by:
Linux Networking and Security
Lecture 1 Page 1 CS 239, Fall 2010 Distributed Denial of Service Attacks and Defenses CS 239 Advanced Topics in Computer Security Peter Reiher September.
Side-Channel Leaks in Web Applications: a Reality Today, a Challenge Tomorrow By Kalyan Manda Chang Seok Bae.
Transport Layer COM211 Communications and Networks CDA College Theodoros Christophides
Internet Architecture and Governance
Welcome to State of Michigan Time & Expense Processing Employee Expense Modification (No Advance) Tutorial Brought to you by the Office of Financial Management.
Security Protocols Vitaly Shmatikov CS Security Protocols  Use cryptography to achieve some higher-level security objective Authentication, confidentiality,
Keeping Records and Paying Taxes. Organizing Your Financial Records Financial records documents such as bank statements, motor vehicle titles, insurance.
Lecture 13: Anonymity on the Web Modified from Levente Buttyan, Michael K. Reiter and Aviel D. Rubin.
Networks Part 3: Packet Paths + Wireshark NYU-Poly: HSWP Instructor: Mandy Galante.
Internet Applications (Cont’d) Basic Internet Applications – World Wide Web (WWW) Browser Architecture Static Documents Dynamic Documents Active Documents.
Goals: Describe the financial planning process. Explain action for implementing a financial plan. Identify actions for reviewing a financial plan.
It’s your Money! How to make your tax refund work for you!
Lecture 17 Page 1 CS 236 Online Onion Routing Meant to handle issue of people knowing who you’re talking to Basic idea is to conceal sources and destinations.
science/internet-intro
Personal Income Tax Mary B Pearson, CPA Assistant Professor of Accounting.
Understanding your Paycheck. What information in on a pay stub? Gross wages- how much you earn before taxes and other deductions Net wages- amount left.
Presenter Name Title MFS Investment Management ® Age-Based Milestones ©2010 MFS Investment Management ®. MFS ® investment products are offered.
Protecting your search privacy A lesson plan created & presented by Maria Bernhey (MLS) Adjunct Information Literacy Instructor
Maintaining and Updating Windows Server 2008 Lesson 8.
16 Money Management and Financial Planning
Financial Aid Navigating James Hammar
Financial Aid Navigating James Hammar
Side-Channel Attack on Encrypted Traffic
Statistical Identification of Encrypted Web-Browsing Traffic
Financial Aid Navigating James Hammar
Anonymous Communication
Taxes Objective: SWBAT evaluate the basics about taxes
CAPITAL GAIN OR LOSS PUB 4012 TAB d Pages D-36 to D-43.
16 Money Management and Financial Planning
Web Privacy Chapter 6 – pp 125 – /12/9 Y K Choi.
Anonymous Communication
Financial Aid Navigating Neil Leibundguth
MoneyCounts: A Financial Literacy Series
UEI BUSINESS OFFICE ADMINISTRATION
Some slides from Shuo Chen
How does the deep web work?
Financial Aid Navigating Neil Leibundguth
Presentation transcript:

Rui Wang, XiaoFeng Wang and Kehuan Zhang Shuo Chen IEEE Symposium on Security and Privacy Oakland, California May 17 th, 2010

(1) split between client and server (2) state transitions driven by network traffic Traditional PC application Web application Worry about privacy? Lets do encryption.

The eavesdropper cannot see the contents, but can observe : number of packets, timing/size of each packet Previous research showed privacy issues in various domains: SSH, voice-over-IP, video-streaming, anonymity channels (e.g., Tor) Our motivation and target domain: target: todays web applications motivation: Software-as-a-Service (SaaS) becomes mainstream, and the web is the platform to deliver SaaS apps.

Surprisingly detailed user information is being leaked out from several high-profile web applications personal health data, family income, investment details, search queries (Anonymized app names per requests from related companies) The root causes are some fundamental characteristics in todays web apps stateful communication, low entropy input and significant traffic distinctions. Defense is non-trivial effective defense needs to be application specific. calls for a disciplined web programming methodology.

Scenario: search using encrypted Wi-Fi WPA/WPA2. Example: user types list on a WPA2 laptop. Consequence: Anybody on the street knows our search queries. Attackers effort: linear, not exponential Query suggestion

( A denoting a pseudonym) A web application by one of the most reputable companies of online services Illness/medication/surgery information is leaked out, as well as the type of doctor being queried. Vulnerable designs Entering health records By typing – auto suggestion By mouse selecting – a tree-structure organization of elements Finding a doctor Using a dropdown list item as the search input

tabs suggestions Entering health records: no matter keyboard typing or mouse selection, attacker has a 2000 ambiguity reduction power. Find-A-Doctor: attacker can uniquely identify the specialty.

It is the online version of one of the most widely used applications for the U.S. tax preparation. Design: a wizard-style questionnaire Tailor the conversation based on users previous input. The forms that you work on tell a lot about your family Filing status Number of children Paid big medical bill The adjusted gross income (AGI)

Entry page of Deductions & Credits Summary of Deductions & Credits Full credit Not eligible Partial credit All transitions have unique traffic patterns. Consult the IRS instruction: $1000 for each child Phase-out starting from $110,000. For every $1000 income, lose $50 credit. $0 $110000$ Not eligible Full credit Partial credit (two children scenario)

Entry page of Deductions & Credits Summary of Deductions & Credits Full credit Not eligible Partial credit Even worse, most decision procedures for credits/deductions have asymmetric paths. Eligible – more questions Not eligible – no more question Enter your paid interest $0 $115000$ Not eligible Full credit Partial credit

Disabled Credit $24999 Retirement Savings $53000 IRA Contribution $85000$ College Expense $ $ Student Loan Interest $ First-time Homebuyer credit $ $ Earned Income Credit $41646 Child credit * $ Adoption expense $ $ $ or $ or $ … $0 We are not tax experts. OnlineTax A can find more than 350 credits/deductions.

A major financial institution in the U.S. Which funds you invest? No secret. Each price history curve is a GIF image from MarketWatch. Everybody in the world can obtain the images from MarketWatch. Just compare the image sizes! 3346 B 3312 B 3294 B Your investment allocation Given only the size of the pie chart, can we recover it? Challenge: hundreds of pie-charts collide on a same size.

Inference based on the evolution of the pie-chart size in 4-or-5 days The financial institution updates the pie chart every day after the market is closed. The mutual fund prices are public knowledge. 800 charts 80 charts 8 charts 1 chart Size of day 1 Size of day 2; Prices of the day Size of day 3; Prices of the day Size of day 4; Prices of the day charts

Root causes: some fundamental characteristics of todays web applications

Fundamental characteristics of web apps Significant traffic distinctions – The chance of two different user actions having the same traffic pattern is really small. – Distinctions are everywhere in web app traffic. Its the norm. Low entropy input – Eavesdropper can obtain a non-negligible amount of information Stateful communication – Many pieces of non-negligible information can be correlated to infer more substantial information – Often, multiplicative ambiguity reduction power!

Challenging to Mitigate the Vulnerabilities

Traffic differences are everywhere. Which ones result in serious data leaks? Need to analyze the application semantics, the availability of domain knowledge, etc. Hard. Is there a vulnerability-agnostic defense to fix the vulnerabilities without finding them? Obviously, padding is a must-do strategy. Packet size rounding: pad to the next multiple of Random-padding: pad x bytes, and x [0, ) We found that even for the discussed apps, the defense policies have to be case-by-case.

OK to use rounding or random-padding 32.3% network overhead (i.e., 1/3 bandwidth on side- channel info hiding)

Neither rounding nor random-padding can solve the problem. Because of the asymmetric path situation

Rounding is not appropriate, because Googles responses are compressed. The destination networks may or may not uncompress the responses E.g., Microsoft gateways uncompress and inspect web traffic, but Indiana University does not. rounding before the compression Indiana Univ. still sees distinguishable sizes; rounding after the compression Microsoft still sees distinguishable sizes

Random padding is not appropriate, because Repeatedly applying a random padding policy to the same responses will quickly degrade the effectiveness. Suppose the user checks the mutual fund page for 7 times, then 96% probability that the randomness shrinks to /2. OnlineInvest A cannot do the padding by itself Because the browser loads the images from MarketWatch.

Need to develop a disciplined methodology for side-channel-info hiding

Acknowledgements Ranveer Chandra – guidance on Wi-Fi experiments Cormac Herley – suggestion about using the pie-chart evolution in multiple days Emre Kiciman – Insights about the HTTP protocol Johnson Apacible, Rob Oikawa, Jim Oker and Yi-Min Wang