Side-Channel Leaks in Web Applications: a Reality Today, a Challenge Tomorrow By Kalyan Manda Chang Seok Bae.

Slides:



Advertisements
Similar presentations
Rui Wang, XiaoFeng Wang and Kehuan Zhang Shuo Chen IEEE Symposium on Security and Privacy Oakland, California May 17 th, 2010.
Advertisements

1 Evaluation Rong Jin. 2 Evaluation  Evaluation is key to building effective and efficient search engines usually carried out in controlled experiments.
A Survey of Botnet Size Measurement PRESENTED: KAI-HSIANG YANG ( 楊凱翔 ) DATE: 2013/11/04 1/24.
Networking Problems in Cloud Computing Projects. 2 Kickass: Implementation PROJECT 1.
Sec-TEEN: Secure Threshold sensitive Energy Efficient sensor Network protocol Ibrahim Alkhori, Tamer Abukhalil & Abdel-shakour A. Abuznied Department of.
Doc.: IEEE /0604r1 Submission May 2014 Slide 1 Modeling and Evaluating Variable Bit rate Video Steaming for ax Date: Authors:
Predicting Tor Path Compromise by Exit Port IEEE WIDA 2009December 16, 2009 Kevin Bauer, Dirk Grunwald, and Douglas Sicker University of Colorado Client.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
An Approach to Evaluate Data Trustworthiness Based on Data Provenance Department of Computer Science Purdue University.
1 On Protecting Private Information in Social Networks: A Proposal Bo Luo 1 and Dongwon Lee 2 1 The University of Kansas, 2 The Pennsylvania.
Polymorphic blending attacks Prahlad Fogla et al USENIX 2006 Presented By Himanshu Pagey.
Attack Presented by: Vinuthna Nalluri and Brett Parker.
 Guarantee that EK is safe  Yes because it is stored in and used by hw only  No because it can be obtained if someone has physical access but this can.
Secure Shell – SSH Tam Ngo Steve Licking cs265. Overview Introduction Brief History and Background of SSH Differences between SSH-1 and SSH- 2 Brief Overview.
Toward a Framework for Preventing Side-Channel Attacks in Wireless Networks Jeff Pang.
Wide-scale Botnet Detection and Characterization Anestis Karasaridis, Brian Rexroad, David Hoeflin.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
1 Chapter 13: Representing Identity What is identity Different contexts, environments Pseudonymity and anonymity.
Building Knowledge-Driven DSS and Mining Data
Unconstrained Endpoint Profiling (Googling the Internet)‏ Ionut Trestian Supranamaya Ranjan Aleksandar Kuzmanovic Antonio Nucci Northwestern University.
Software Architecture Quality. Outline Importance of assessing software architecture Better predict the quality of the system to be built How to improve.
Science and Engineering Practices
Game-based Analysis of Denial-of- Service Prevention Protocols Ajay Mahimkar Class Project: CS 395T.
CLICK FRAUD Alexander Tuzhilin By Vinny Rey. Why was the study done? Google was getting sued by advertisers because of click fraud. Google agreed to have.
ICT TEACHERS` COMPETENCIES FOR THE KNOWLEDGE SOCIETY
Key-Stroke Timing and Timing Attack on SSH Yonit Shabtai and Michael Lustig supervisor: Yoram Yihyie Technion - Israel Institute of Technology Computer.
D ATABASE S ECURITY Proposed by Abdulrahman Aldekhelallah University of Scranton – CS521 Spring2015.
FLOWFOX A WEB BROWSER WITH FLEXIBLE AND PRECISE INFORMATION CONTROL.
Lucent Technologies – Proprietary Use pursuant to company instruction Learning Sequential Models for Detecting Anomalous Protocol Usage (work in progress)
FALL 2012 DSCI5240 Graduate Presentation By Xxxxxxx.
A User Experience-based Cloud Service Redeployment Mechanism KANG Yu.
Preventing SQL Injection Attacks in Stored Procedures Alex Hertz Chris Daiello CAP6135Dr. Cliff Zou University of Central Florida March 19, 2009.
P.1Service Control Technologies for Peer-to-peer Traffic in Next Generation Networks Part2: An Approach of Passive Peer based Caching to Mitigate P2P Inter-domain.
Global NetWatch Copyright © 2003 Global NetWatch, Inc. Factors Affecting Web Performance Getting Maximum Performance Out Of Your Web Server.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
I Do Not Know What You Visited Last Summer: Protecting users from stateful third-party web tracking with TrackingFree browser Xiang Pan §, Yinzhi Cao †,
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
PSEUDONYMIZATION TECHNIQUES FOR PRIVACY STUDY WITH CLINICAL DATA 1.
Protecting Sensitive Labels in Social Network Data Anonymization.
CSC-682 Advanced Computer Security Analyzing Websites for User-Visible Security Design Flaws Pompi Rotaru Based on an article by : Laura Falk, Atul Prakash,
Network Security Lecture 20 Presented by: Dr. Munam Ali Shah.
V0.0CPSC415 Biometrics and Cryptography1 Placement of Encryption Function Lecture 3.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Srivastava J., Cooley R., Deshpande M, Tan P.N.
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES Lesson №18 Telecommunication software design for analyzing and control packets on the networks by using.
.  Define risk and risk management  Describe the components of risk management  List and describe vulnerability scanning tools  Define penetration.
Unconstrained Endpoint Profiling Googling the Internet Ionut Trestian, Supranamaya Ranjan, Alekandar Kuzmanovic, Antonio Nucci Reviewed by Lee Young Soo.
A paper by: Paul Kocher, Joshua Jaffe, and Benjamin Jun Presentation by: Michelle Dickson.
Search Engine using Web Mining COMS E Web Enhanced Information Mgmt Prof. Gail Kaiser Presented By: Rupal Shah (UNI: rrs2146)
Bloom Cookies: Web Search Personalization without User Tracking Authors: Nitesh Mor, Oriana Riva, Suman Nath, and John Kubiatowicz Presented by Ben Summers.
Supplemental Information on TOR (The Onion Router) CEH ed 8, Rev 4 CS3695 – Network Vulnerability Assessment & Risk Mitigation–
Presentation for CDA6938 Network Security, Spring 2006 Timing Analysis of Keystrokes and Timing Attacks on SSH Authors: Dawn Xiaodong Song, David Wagner,
Identifying “Best Bet” Web Search Results by Mining Past User Behavior Author: Eugene Agichtein, Zijian Zheng (Microsoft Research) Source: KDD2006 Reporter:
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
@Yuan Xue CS 285 Network Security Block Cipher Principle Fall 2012 Yuan Xue.
DOWeR Detecting Outliers in Web Service Requests Master’s Presentation of Christian Blass.
Side-Channel Attack on Encrypted Traffic
Statistical Identification of Encrypted Web-Browsing Traffic
Anonymous Communication
Host of Troubles : Multiple Host Ambiguities in HTTP Implementations
CIS 333 Competitive Success/snaptutorial.com
CIS 333Competitive Success/tutorialrank.com
CIS 333 Education for Service-- snaptutorial.com.
CIS 333 Education for Service-- tutorialrank.com.
CIS 333 Teaching Effectively-- snaptutorial.com
Anonymous Communication
Some slides from Shuo Chen
Modeling and Evaluating Variable Bit rate Video Steaming for ax
Anonymous Communication
Presentation transcript:

Side-Channel Leaks in Web Applications: a Reality Today, a Challenge Tomorrow By Kalyan Manda Chang Seok Bae

INTRODUCTION Network SaaS -> Software as a Service

Side-channel information leaks To protect the information in critical applications against network sniffing, a common practice is to encrypt their network traffic. However, as discovered in our research, serious information leaks are still a reality. Even though the communications generated during these state transitions are protected by HTTPS, their observable attributes, such as packet sizes and timings, can still give away the information about the user’s selection.

Contributions Analysis of the side-channel weakness in web applications.  We present a model to analyze the side-channel weakness in web applications and attribute the problem to prominent design features of these applications.  Show concrete vulnerabilities in several high-profile and really popular web applications, which disclose different types of sensitive information through various application features.  These studies lead to the conclusion that the side-channel information leaks are likely to be fundamental to web applications. In-depth study on the challenges in mitigating the threat.  We evaluated the effectiveness and the overhead of common mitigation techniques such as packet padding.  Our research shows that effective solutions to the side-channel problem have to be application-specific, relying on an in-depth understanding of the application being protected.  This suggests the necessity of a significant improvement of the current practice for developing web applications.

Related Work In the context of encrypted communications, it has been shown that the side-channel information, such as packet timing and sizes, allows a network eavesdropper to break: – cryptographic systems or infer keystrokes in SSH, – spoken phrases in VoIP – movie titles in video-streaming systems – the attacker can fingerprint web pages by their side- channel characteristics, then eavesdrop on the victim user’s encrypted traffic to identify which web pages the user visits.

MOTIVATION Our work is motivated by these anonymity studies, but is different in a number of major aspects: (1) our study focuses on web applications and the sensitive user data leaked out from them, rather than the identifiability of individual web pages; (2) application state-transitions and semantics are the focal point of our analyses, while the prior studies are agnostic to them; (3) our target audience is the developers of sensitive web applications, while the natural audience of the web-anonymity research is the providers of anonymity channels, as their objective is directly confronted by the anonymity issue studied in the prior research.

FUNDAMENTALS OF WEB APPLICATION INFORMATION LEAKS Ambiguity Set Reduction Process: If the ambiguity-set (U)can be reduced to 1/ ℜ of its original size, we say that log 2 ℜ bits of entropy of the data are lost.

Model Abstraction A web application can be modeled as a quintuple (S, ∑, ∂, f, V): S -> set of program states that describe application data both on browser and server. ∑ -> set of inputs the application accepts. ∂: S x ∑ -> S -> models a state transition from one state to another driven by the input the former receives. f: S x ∑ -> V f -> the observable attributes such as packet sizes, number of packets used to characterize the original state and its inputs. V -> set of web flow vectors that describe the observable characteristics of the encrypted traffic.

Inference of Sensitive Points The attacker is able to identify one of the k/(αβ) input sets, which the actual input belongs to.

Threat Analysis over Web Application Properties Some prominent features of application design making this threat realistic are:  Low entropy inputs for better interactions.  Stateful Communications.  Significant traffic distinctions.

Significant traffic distinctions

Actual Information Leaks in High Profile Applications - OnlineHealth 1) Add Health Records:

Input by mouse selecting – a caveat of hierarchical organization of user choices

Find a Doctor Selection from the drop- down list gives a very- low-entropy input: there are only 94 specialties. We tested all the specialties in “south bend, IN”, and found that x was within [596, 1660], i.e., density = 0.089, and every specialty is uniquely identifiable.

Remaining Topics Remaining leaks cases in applications – OnlineTax – OnlineInvest – Online Search Mitigating side-channel treats – Evaluation of mitigation efforts – Impacts on application development process

OnlineTax Leaks Tax-preparation wizard – calculate Adjusted Gross Income Inference – High entropy – Facts User’s eligibilities for credit/deduction, which can be identified form tax laws Such eligibilities affect state transition

OnlineTax: Symmetric Path Based on the value of b, transition can be determined to one of three possible states According to tax law, taxpayer’s AGI falls into one of three ranges

OnlineTax: Asymmetric Path If user is partially of fully qualified, the path of state transitions will be longer than that for those not eligible

Graphical visualization of data Mutual fund list – Low entropy – Size of chart and detail pages are distinct (type d=0.044, detailed page d=0.010) OnlineInvest Leak

OnlineInvest: Fund Allocation Higher entrophy –State transitions over a multiple-day period can give significant reduction power

OnlineInvest: Fund Allocation Algorithm – Function to calculates today’s percentage, given yesterday’s allocation Lossless compression algorithm in GIF give same compression data Experimental result – Given initial ambiguity set contains – Pie chart size reduces by more-than-one order of magnitude (4 different days)

Query Word Leaks Web flow vector – Auto suggestions are easy to identify Ambiguity set size – Possible query words are huge, but number of guesses are only number of queries Caching effect – Missing character due to caching brings only 2- letter combinations, 26x26 – In some cases of Google, caching disappears

See if problem can be solved without analyzing individual application Application-agnostic manner: Padding – Rounding: – Random padding: – Average overhead: – Given, reduction power being calculated after pdding Universal Mitigation Policies

Mitigation: OnlineHealth Leaks Rounding Mitigation incurs a large overhead, one third of the bandwidth Still, cannot fully subdue the information leak (mouse- selection) Leveraged information can achieve bigger reduction power (probabilistic correlations among conditions)

Mitigation: OnlineTax Leaks Rounding Superfluous packets, 21074% overhead Merge multiple state to be indistinguishable Remaining 7 identifiable ranges, due to asymmetric path

Mitigation: Search Engine Leaks Hard to mitigate – Huge-volume search traffic cost of mitigation to entire traffic unsustainably high – Application scenarios Proxy vs. non-proxy network – Proxy requires traffic to be decompressed Incur considerations – Random padding – When to pad (before or after the compression) – Where to pad (header or body)

Two leak problems cannot be addressed without padding Random padding comparison Each generating random numbers, in case 7 above, degrade to Enforcement difficulty Price history charts are fetched from public website Mitigation: OnlineInvest Leaks

Application Development Practice Identifying Vulnerabilities – Stateful communication with user input or stored data – Information flow and background knowledge Specifying Mitigation Policies – Necessary collaborative effort Vendors of browsers and web servers Communicate to protocol layer about policies

Policy specification and enforcement Preliminary Infrastructure

Future Development Process

Conclusion Web application – Low entropy input, stateful communication, and significant traffic distinction Mitigation policy have to be application specific – Identification of vulnerabilities – Specify mitigation policy Application semantics, Information flow, network traffic pattern, and public domain knowledge