Presentation is loading. Please wait.

Presentation is loading. Please wait.

15-446 Networked Systems Practicum Lecture 12 – Privacy 1.

Similar presentations


Presentation on theme: "15-446 Networked Systems Practicum Lecture 12 – Privacy 1."— Presentation transcript:

1 15-446 Networked Systems Practicum Lecture 12 – Privacy 1

2 Outline TaintDroid ZIA/Transient Authentication CleanOS 2

3 TaintDroid 3

4 Taint Analysis 4

5 Design 5

6 6

7 Taint Propagation 7

8 Native Methods 8

9 Msgs and Files 9

10 Performance 10

11 Taint Sources 11

12 Findings 12

13 Findings 13

14 Outline TaintDroid ZIA/Transient Authentication CleanOS 14

15 ZIA: Losing Your Laptop Imagine rushing to a talk and leaving your laptop in a taxi cab A finder may be malicious, may not be What do you do in the interim? buy a new machine---not really a big deal just like credit cards you should cancel all your passwords what about your web cache? what about your account numbers?

16 Tension in Proving Identity The device can ask for proof once and never ask again finder assumes the full rights of the user The device can continuously ask users would not tolerate such a system A compromise is to ask periodically Current authentication methods do not resolve this tension hedge on the side of less security and more usability Need something to provide constant proof without user burden More Secure Less Usable More Usable Less Secure Frequency of Proof

17 Solution: Constant but Invisible Authentication Transient Authentication protect data by constantly authenticating user keep usable by having something answer for the user Authentication token: provides this ability worn by user to prove proximity enough computational power for small cryptographic tasks communication via short-range wireless network Challenge Response

18 Tie Capabilities to Token Require token to decrypt device’s data device alone is useless, regardless of physical attacks Tokens have limited computation, (slow) wireless link tokens cannot decrypt data directly never expose root capability, key-encrypting keys only transmit data key

19 Tie Capabilities to Token Require token to decrypt device’s data device alone is useless, regardless of physical attacks Tokens have limited computation, (slow) wireless link tokens cannot decrypt data directly never expose root capability, key-encrypting keys only transmit data key

20 Tie Capabilities to Token Require token to decrypt device’s data device alone is useless, regardless of physical attacks Tokens have limited computation, (slow) wireless link tokens cannot decrypt data directly never expose root capability, key-encrypting keys only transmit data key

21 Tie Capabilities to Token Require token to decrypt device’s data device alone is useless, regardless of physical attacks Tokens have limited computation, (slow) wireless link tokens cannot decrypt data directly never expose root capability, key-encrypting keys only transmit data key

22 Tie Capabilities to Token Require token to decrypt device’s data device alone is useless, regardless of physical attacks Tokens have limited computation, (slow) wireless link tokens cannot decrypt data directly never expose root capability, key-encrypting keys only transmit data key

23 Zeroed Data Just Faster than Attackers When token does not answer assume user is absent, protect all keys/data Protection doesn’t have to be instantaneous just faster than attackers, people are slow TA has two alternatives: flush vs. encrypt flush is faster than encrypt on departure filling data is potentially slow or require user intervention encrypt is slower to protect, but faster on return Secret User Departs

24 Do No Harm Key acquisition costly (~10ms) too expensive to pay on every use of data overhead would be prohibitive without optimization Some techniques hide/avoid cost cache data keys pre-fetch fresh keys Optimizations reduce laptop/token interactions loss of interaction  user has left add periodic polling to refresh authentication

25 Ensure Explicit Consent Could keep users entirely out of the loop complete transparency == complete loss of control Consider the “tailgater” attack thief steals my advisor’s laptop thief sits behind me advisor’s laptop asks for key-encrypting key my token transparently responds Solution: provide explicit binding between tokens/devices this user means to use that laptop can be infrequent, e.g. once a day

26 Foil tailgaters How do I prevent my token from responding to your laptop? called the tailgater attack Leverage the login process users already are familiar with suppose mcorner logs into weir.eecs weir.eecs sends a challenge to mcorner’s token user gives response to the token could be simple (a tap) or complicated (one-time pass) token then bound: only bound tokens respond unless I bind my token to your laptop, you lose Provides assurance that this user means to use that laptop user plays the role of trusted third party in binding

27 Application Protection Protections for file systems exist: ZIA (Mobicom ‘02) Protecting file systems is not enough data read from file system into address space (and read from network, and typed by user, and …) Mobile devices are typically always on or suspended ephemeral state always vulnerable Possible attacks on memory space OS interfaces probing memory bus

28 Application-Transparent Protection Simple solution: encrypt entire memory space suspend processes & encrypt in-memory state on departure decrypt state & resume processes on return encrypt and decrypt 216MB state in <10s Brute-force approach may be overkill not all applications are sensitive not all application state is sensitive application might know the difference could perform useful, non-secure work

29 Application-Aware Protection Through an API give applications ability to continue to execute manage their own secrets gain information about user proximity Services provided to application register departure/return callbacks request decryption/encryption of buffer with master key obtain fresh keys Application/designer responsible for identifying sensitive state/operations tying capabilities to token

30 Outline TaintDroid ZIA/Transient Authentication CleanOS 30

31 CleanOS 31

32 Threats 32

33 Problems with State-of-Art 33

34 Key Observations 34

35 Design 35

36 Design 36

37 Design 37

38 SDOs 38

39 SDO example 39

40 Garbage Collector 40

41 WiFi Performance 41

42 3G Performance 42


Download ppt "15-446 Networked Systems Practicum Lecture 12 – Privacy 1."

Similar presentations


Ads by Google