Gyrus: A Framework for User- Intent Monitoring of Text- Based Networked ApplicaAons



Similar documents
Gyrus: A Framework for User- Intent Monitoring of Text- Based Networked ApplicaAons

Gyrus: A Framework for User-Intent Monitoring of Text-Based Networked Applications

Computer Security Incident Handling Detec6on and Analysis

Design and Evalua.on of a Real- Time URL Spam Filtering Service

FRESCO: Modular Composable Security Services for So;ware- Defined Networks

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

PALO ALTO SAFE APPLICATION ENABLEMENT

Retrofi8ng OAuth 2.0 Security into Exis?ng REST Service [CON1765]

How To Use Splunk For Android (Windows) With A Mobile App On A Microsoft Tablet (Windows 8) For Free (Windows 7) For A Limited Time (Windows 10) For $99.99) For Two Years (Windows 9

Protec'ng Communica'on Networks, Devices, and their Users: Technology and Psychology

Soft-Timer Driven Transient Kernel Control Flow Attacks and Defense

8/25/14 SMORE : So)ware- Defined Networking Mobile Offloading Architecture

Open-Xchange Guard Major Release v Feature Overview V1.4

Understanding and Detec.ng Real- World Performance Bugs

Privacy- Preserving P2P Data Sharing with OneSwarm. Presented by. Adnan Malik

Defending Against Web App A0acks Using ModSecurity. Jason Wood Principal Security Consultant Secure Ideas

benefit of virtualiza/on? Virtualiza/on An interpreter may not work! Requirements for Virtualiza/on 1/06/15 Which of the following is not a poten/al

HTTPS Inspection with Cisco CWS

/Endpoint Security and More Rondi Jamison

WSECU Cyber Security Journey. David Luchtel VP IT Infrastructure & Opera:ons

List Management : Campaign Dashboard. Campaign Dashboard. Displays all recent campaign ac5vity when you first log in

Kaseya Fundamentals Workshop DAY THREE. Developed by Kaseya University. Powered by IT Scholars

Office of History. Using Code ZH Document Management System

Main Research Gaps in Cyber Security

An Integrated Approach to Manage IT Network Traffic - An Overview Click to edit Master /tle style

Splunk and Big Data for Insider Threats

Example of Standard API

Security Challenges & Opportunities in Software Defined Networks (SDN)

Palo Alto Networks Cyber Security Platform for the Software Defined Data center. Zekeriya Eskiocak Security Consultant Palo Alto Networks

Using Mobile to Capture In- the- Moment Insights

SECURING YOUR MODERN DATA CENTER WITH CHECK POINT

Privileged Administra0on Best Prac0ces :: September 1, 2015

Member Municipality Security Awareness Training. End- User Informa/on Security Awareness Training

Networked Virtual Spaces and Clouds. Magda El Zarki UC Irvine

Tamper-Resistant, Application-Aware Blocking of Malicious Network Connections

Stream Deployments in the Real World: Enhance Opera?onal Intelligence Across Applica?on Delivery, IT Ops, Security, and More

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

SDN- based Mobile Networking for Cellular Operators. Seil Jeon, Carlos Guimaraes, Rui L. Aguiar

CONTENTS. Introduction Outlook at a glance Configure Outlook 2010 on-campus Creating Folders Sorting s...

Stephen Coty Director, Threat Research

Google Cloud Print Guide

Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0

Splunk for Networking and SDN

IT Change Management Process Training

NFPA 70E: What Contractors and Employers Need to Know

Adobe Marketing Cloud Bloodhound for Mac 3.0

Mobile Applica,on and BYOD (Bring Your Own Device) Security Implica,ons to Your Business. Dmitry Dessiatnikov

The Data Reservoir. 10 th September Mandy Chessell FREng CEng FBCS Dis4nguished Engineer, Master Inventor Chief Architect, Informa4on Solu4ons

Using Outlook Web Access

GroupWise to MS Outlook 2007

Specialized Android APP Development Program with Java (SAADPJ) Duration 2 months

VoIP Security How to prevent eavesdropping on VoIP conversa8ons. Dmitry Dessiatnikov

Google Cloud Print Guide

BadUSB On accessories that turn evil

KASPERSKY FRAUD PREVENTION FOR ENDPOINTS

What Role Does Hardware Design Have to Play in Cybersecurity? Srini Devadas Massachuse0s Ins2tute of Technology

Cloud Compu)ng: Overview & challenges. Aminata A. Garba

Architecture and Data Flow Overview. BlackBerry Enterprise Service Version: Quick Reference

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

The Seven Habits of State-of-the-Art Mobile App Security

at Bradford - Outlook

A Survey on Virtual Machine Security

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

Some Security Challenges of Cloud Compu6ng. Kui Ren Associate Professor Department of Computer Science and Engineering SUNY at Buffalo

WildFire Overview. WildFire Administrator s Guide 1. Copyright Palo Alto Networks

M100 System File Manager Help

Software design (Cont.)

GUJARAT TECHNOLOGICAL UNIVERSITY

Internet Storage Sync Problem Statement

Network Security. Computer Security & Forensics. Security in Compu5ng, Chapter 7. l Network Defences. l Firewalls. l Demilitarised Zones

Transcription:

Gyrus: A Framework for User- Intent Monitoring of Text- Based Networked ApplicaAons Yeongjin Jang*, Simon P. Chung*, Bryan D. Payne, and Wenke Lee* *Georgia Ins=tute of Technology Nebula, Inc 1

Tradi=onal Host- Based Security Misuse detec=on: cannot handle unknown akacks Anomaly detec=on: mimicry akacks 2

Mo=va=on Defining akack is hard 0- day, mimicry akack, and etc AKacks are keep evolving Then, can we design a security monitor that works for the new akacks? 3

A New Approach Objec=ve Protec=ng integrity of user intended text content that will be sent as network packets. AKack- agnos=c Defense It does not depend on the how the akack works. Examples of the ways of akacks AKach to a process to change some text values Directly write on /dev/mem to modify sensi=ve values We only make sure the monitored system is behaving correctly Essen=ally looking at the opposite side of akack detec=on. 4

Related Works Using Timing Informa=on BINDER [ACSAC 05, Cui et. al.] Not- A- Bot, [NSDI 09, Gummadi et. al.] User- intent Detec=on Monitors physical keystrokes/mouse clicks A traffic without user input preceded in a short =me window is not user- intended, a malicious ac=vity. User- intended behavior: T network T input < T threshold Simple, but effec=ve defense for exis=ng akacks 5

Related Works (Cont d) User- Driven Access Control [Oakland 12, Roesner et. al.] Access Control Gadget (ACG) A UI gadget that grants permission to the resource when it is clicked. Examples» Camera icon - > grant access to camera» File- saving icon - > grant access to filesystem 6

Related Works (Cont d) Problem Only checks existence of user intent (yes/no) BINDER & Not- A- Bot Send malicious network traffic shortly aler every keystrokes ACG Free to use the resource aler gemng of the access Nobody took account into monitoring user- intended content. Why? 7

Capturing User- intended Text Straighoorward way Looking at keystrokes Keycode can be caught at keyboard driver w, r, i, t, e, ENTER Cursor point and bukon can be caught at mouse driver (x, y, bukon) - > (325, 641, LCLICK) 8

Capturing User- intended Text Challenges Mouse Move cursor on click! Drag to select text, then delete Keyboard Copy & Paste AutoComplete Rich seman=cs of UI is needed. 9

Capturing User- intended Text A beker approach User interacts with computer using input/output hardware Input: Keyboard, Mouse Output: Display screen Feedback loop in the user interac=on 10

Capturing User- intended Text Observa=on User naturally verifies what they type by what they sees on the screen A New Security Policy What You See Is What You Send (WYSIWYS) We assume on- screen text is user- intended Only allows outgoing traffic that matches on- screen text Hi, there! Hey, send me $100 11

Secure Overlay Combined Screen On- screen text is always same with captured text on the security monitor. 12

Secure Overlay Only re- draws editbox Exactly same loca=on, size, and color Can support rich- text Font, size, color, style, and etc. Passive UI It does not gets any user input. Content will be updated aler each applica=ons gets input. Support selec=on, copy/paste, spell correc=on, auto- comple=on, etc 13

UI Monitor Uses library for UI Tes=ng (UIAutoma=on) 14

The Gyrus Architecture 15

Threat Model Hypervisor and security VM is fully trusted. Assumes VM escape is impossible. Hardware input devices are trusted, and the akacker has no physical access to it. AKacker cannot forge hardware input event 16

Threat Model (Cont d) All hardware input event is interposed at hypervisor first, then delivered to User VM Security VM cannot miss hardware event, and User VM cannot emulate it. We completely distrust User VM We allows all akacks including Kernel- level malware. UI monitor is untrusted. 17

How Gyrus Works Iden=fying and overlaying all editboxes Only shows for focused window Suppress background update Track updates Updates all editbox on Change of focus Change of loca=on Change of content 18

How Gyrus Works On every user interac=on, checks whether it triggers traffic Traffic- triggering event Click `Send bukon on GMail Pressing `ENTER on facebook message dialog Pressing Ctrl- S on Outlook Express 19

Capture User- Intent Extract all required text from Secure Overlay when traffic- triggering event happens. Store it to Authoriza=on DB for enforcement at network level. 20

Applica=on- specific Logics User Intent Signature 21

Network Monitor A transparent proxy with deep- packet inspec=on Extract user- intent from the traffic, query authoriza=on DB Pass only when it is matched with stored intent Requires proxy per each protocol SSL traffic should be decrypted (MITM) 22

Applica=on Examples 23

Evalua=on Security For exis=ng akacks on Apps WYSIWYS is enforced All malware failed to send their traffic on» E- mail client (send spam)» Internet Messenger (send spam)» Facebook (post ar=cle, message, and etc.)» Paypal (XSS)» Etc.. 24

Evalua=on Security Incorrect User Intent Signature On akacking UI monitor in Guest VM Failure on gemng correct informa=on False posi=ve, user traffic will be blocked DoS 25

Evalua=on Performance Interac=on delay Checked turn- around =me star=ng from the input, end with the resul=ng text or ac=ons on the Overlay Can handle around 1,400 inputs / min (43ms delay) 26

Evalua=on Performance Network delay 27

Limita=ons Can only handle text so far.. File/Image akachments What we see: name of path (e.g., c:\boot.ini) What machine sends: content of the file Using ACG would be helpful Only works if what you see is really what you send Not the case if displayed text undergone a lot of (proprietary) processing before being sent out. However, base64, SSL, and REST API through HTTPS can be handled. 28

Conclusion Gyrus A correct- behavior based monitoring system. Monitors user- intended text through on- screen UI data, and enforcing WYSIWYS policy. Protect most of text- based user applica=ons with minimal overhead. Its akack- agnos=c defense works for preven=ng future akacks. 29

Ques=ons? Q&A 30

Discussions AKacks on UI monitor Malware that tries to modify text At network monitor, it only allows text in the authoriza=on DB. Authoriza=on DB only stores on- screen text. => The text content malware would send should be on- screen. => User will be no=fied from on- screen changes. 31

Future Works Implement in different plaoorm Android (DalVik VM) Thin- client model, a terminal for cloud service Protect different target Disk write (think disk opera=on as a network traffic) Confiden=ality protec=on Gyrus only protects integrity of user intent. 32