Gyrus: A Framework for User- Intent Monitoring of Text- Based Networked ApplicaAons



Similar documents
Gyrus: A Framework for User- Intent Monitoring of Text- Based Networked ApplicaAons

Gyrus: A Framework for User-Intent Monitoring of Text-Based Networked Applications

Computer Security Incident Handling Detec6on and Analysis

Retrofi8ng OAuth 2.0 Security into Exis?ng REST Service [CON1765]

Design and Evalua.on of a Real- Time URL Spam Filtering Service

Soft-Timer Driven Transient Kernel Control Flow Attacks and Defense

FRESCO: Modular Composable Security Services for So;ware- Defined Networks

Open-Xchange Guard Major Release v Feature Overview V1.4

Protec'ng Communica'on Networks, Devices, and their Users: Technology and Psychology

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

List Management : Campaign Dashboard. Campaign Dashboard. Displays all recent campaign ac5vity when you first log in

8/25/14 SMORE : So)ware- Defined Networking Mobile Offloading Architecture

Understanding and Detec.ng Real- World Performance Bugs

Privacy- Preserving P2P Data Sharing with OneSwarm. Presented by. Adnan Malik

HTTPS Inspection with Cisco CWS

An Integrated Approach to Manage IT Network Traffic - An Overview Click to edit Master /tle style

Defending Against Web App A0acks Using ModSecurity. Jason Wood Principal Security Consultant Secure Ideas

PALO ALTO SAFE APPLICATION ENABLEMENT

Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

How To Use Splunk For Android (Windows) With A Mobile App On A Microsoft Tablet (Windows 8) For Free (Windows 7) For A Limited Time (Windows 10) For $99.99) For Two Years (Windows 9

Office of History. Using Code ZH Document Management System

Security Challenges & Opportunities in Software Defined Networks (SDN)

Using Mobile to Capture In- the- Moment Insights

benefit of virtualiza/on? Virtualiza/on An interpreter may not work! Requirements for Virtualiza/on 1/06/15 Which of the following is not a poten/al

Member Municipality Security Awareness Training. End- User Informa/on Security Awareness Training

Tamper-Resistant, Application-Aware Blocking of Malicious Network Connections

GroupWise to MS Outlook 2007

SECURING YOUR MODERN DATA CENTER WITH CHECK POINT

Splunk and Big Data for Insider Threats

Stephen Coty Director, Threat Research

CONTENTS. Introduction Outlook at a glance Configure Outlook 2010 on-campus Creating Folders Sorting s...

Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0

at Bradford - Outlook

WSECU Cyber Security Journey. David Luchtel VP IT Infrastructure & Opera:ons

Network Security. Computer Security & Forensics. Security in Compu5ng, Chapter 7. l Network Defences. l Firewalls. l Demilitarised Zones

Networked Virtual Spaces and Clouds. Magda El Zarki UC Irvine

Privileged Administra0on Best Prac0ces :: September 1, 2015

Microsoft Outlook 2013 Workshop

Kaseya Fundamentals Workshop DAY THREE. Developed by Kaseya University. Powered by IT Scholars

Outlook Mail Quick Fixes

IT Change Management Process Training

From Network Security To Content Filtering

Stream Deployments in the Real World: Enhance Opera?onal Intelligence Across Applica?on Delivery, IT Ops, Security, and More

KASPERSKY FRAUD PREVENTION FOR ENDPOINTS

VoIP Security How to prevent eavesdropping on VoIP conversa8ons. Dmitry Dessiatnikov

Securing Network Input via a Trusted Input Proxy

/Endpoint Security and More Rondi Jamison

Implementation of Botcatch for Identifying Bot Infected Hosts

Using Outlook Web Access

INCREASINGLY, ORGANIZATIONS ARE ASKING WHAT CAN T GO TO THE CLOUD, RATHER THAN WHAT CAN. Albin Penič Technical Team Leader Eastern Europe

SDN- based Mobile Networking for Cellular Operators. Seil Jeon, Carlos Guimaraes, Rui L. Aguiar

Splunk for Networking and SDN

Architecture and Data Flow Overview. BlackBerry Enterprise Service Version: Quick Reference

Software design (Cont.)

WINDOWS LIVE MAIL FEATURES

LDCDP GdW. L force Controls. Ä.GdWä. Software Manual. Industrial PC. WindowsR CE Thin Client. Operating system

Use signatures in Outlook 2010

Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking

How to Develop Accessible Linux Applications

GUJARAT TECHNOLOGICAL UNIVERSITY

McAfee Network Security Platform

Securing the Intelligent Network

Main Research Gaps in Cyber Security

What is Firewall? A system designed to prevent unauthorized access to or from a private network.

Welcome to EMP Monitor (Employee monitoring system):

Interoperability Tools for CIFS/SMB/SMB2 Paul Long and Simon Sun Microsoft

Next Generation Firewalls and Sandboxing

Bates Gmail Labels, Filters, and Signatures

CONFIGURATION AND SETUP USER GUIDE AND REFERENCE MANUAL

SonicWALL SSL VPN 3.0 HTTP(S) Reverse Proxy Support

Palo Alto Networks Cyber Security Platform for the Software Defined Data center. Zekeriya Eskiocak Security Consultant Palo Alto Networks

WildFire Reporting. WildFire Administrator s Guide 55. Copyright Palo Alto Networks

Microkernels, virtualization, exokernels. Tutorial 1 CSC469

Transcription:

Gyrus: A Framework for User- Intent Monitoring of Text- Based Networked ApplicaAons Yeongjin Jang*, Simon P. Chung*, Bryan D. Payne, and Wenke Lee* *Georgia Ins=tute of Technology Nebula, Inc 1

Tradi=onal Host- Based Security Misuse detec=on: cannot handle unknown akacks Anomaly detec=on: mimicry akacks 2

Mo=va=on Defining akack is hard 0- day, mimicry akack, and etc AKacks are keep evolving Then, can we design a security monitor that works for the new akacks? 3

A New Approach Objec=ve Protec=ng integrity of user intended text content that will be sent as network packets. AKack- agnos=c Defense It does not depend on the how the akack works. Examples of the ways of akacks AKach to a process to change some text values Directly write on /dev/mem to modify sensi=ve values We only make sure the monitored system is behaving correctly Essen=ally looking at the opposite side of akack detec=on. 4

Related Works Using Timing Informa=on BINDER [ACSAC 05, Cui et. al.] Not- A- Bot, [NSDI 09, Gummadi et. al.] User- intent Detec=on Monitors physical keystrokes/mouse clicks A traffic without user input preceded in a short =me window is not user- intended, a malicious ac=vity. User- intended behavior: T network T input < T threshold Simple, but effec=ve defense for exis=ng akacks 5

Related Works (Cont d) User- Driven Access Control [Oakland 12, Roesner et. al.] Access Control Gadget (ACG) A UI gadget that grants permission to the resource when it is clicked. Examples» Camera icon - > grant access to camera» File- saving icon - > grant access to filesystem 6

Related Works (Cont d) Problem Only checks existence of user intent (yes/no) BINDER & Not- A- Bot Send malicious network traffic shortly aler every keystrokes ACG Free to use the resource aler gemng of the access Nobody took account into monitoring user- intended content. Why? 7

Capturing User- intended Text Straighoorward way Looking at keystrokes Keycode can be caught at keyboard driver w, r, i, t, e, ENTER Cursor point and bukon can be caught at mouse driver (x, y, bukon) - > (325, 641, LCLICK) 8

Capturing User- intended Text Challenges Mouse Move cursor on click! Drag to select text, then delete Keyboard Copy & Paste AutoComplete Rich seman=cs of UI is needed. 9

Capturing User- intended Text A beker approach User interacts with computer using input/output hardware Input: Keyboard, Mouse Output: Display screen Feedback loop in the user interac=on 10

Capturing User- intended Text Observa=on User naturally verifies what they type by what they sees on the screen A New Security Policy What You See Is What You Send (WYSIWYS) We assume on- screen text is user- intended Only allows outgoing traffic that matches on- screen text Hi, there! Hey, send me $100 11

What You See Is What You Send WYSIWYS 12

Secure Overlay Combined Screen On- screen text is always same with captured text on the security monitor. 13

Secure Overlay Only re- draws editbox Exactly same loca=on, size, and color Can support rich- text Font, size, color, style, and etc. Passive UI It does not gets any user input. Content will be updated aler each applica=ons gets input. Support selec=on, copy/paste, spell correc=on, auto- comple=on, etc 14

UI Monitor Uses library for UI Tes=ng (UIAutoma=on) 15

The Gyrus Architecture 16

Threat Model Hypervisor and security VM is fully trusted. Assumes VM escape is impossible. Hardware input devices are trusted, and the akacker has no physical access to it. AKacker cannot forge hardware input event 17

Threat Model (Cont d) All hardware input event is interposed at hypervisor first, then delivered to User VM Security VM cannot miss hardware event, and User VM cannot emulate it. We completely distrust User VM We allows all akacks including Kernel- level malware. UI monitor is untrusted. 18

How Gyrus Works Iden=fying and overlaying all editboxes Only shows for focused window Suppress background update Track updates Updates all editbox on Change of focus Change of loca=on Change of content 19

How Gyrus Works On every user interac=on, checks whether it triggers traffic Traffic- triggering event Click `Send bukon on GMail Pressing `ENTER on facebook message dialog Pressing Ctrl- S on Outlook Express 20

Capture User- Intent Extract all required text from Secure Overlay when traffic- triggering event happens. Store it to Authoriza=on DB for enforcement at network level. 21

Applica=on- specific Logics User Intent Signature 22

Network Monitor A transparent proxy with deep- packet inspec=on Extract user- intent from the traffic, query authoriza=on DB Pass only when it is matched with stored intent Requires proxy per each protocol SSL traffic should be decrypted (MITM) 23

Applica=on Examples 24

Evalua=on Security For exis=ng akacks on Apps WYSIWYS is enforced All malware failed to send their traffic on» E- mail client (send spam)» Internet Messenger (send spam)» Facebook (post ar=cle, message, and etc.)» Paypal (XSS)» Etc.. 25

Evalua=on Security Incorrect User Intent Signature On akacking UI monitor in Guest VM Failure on gemng correct informa=on False posi=ve, user traffic will be blocked DoS 26

Evalua=on Performance Interac=on delay Checked turn- around =me star=ng from the input, end with the resul=ng text or ac=ons on the Overlay Can handle around 1,400 inputs / min (43ms delay) 27

Evalua=on Performance Network delay 28

Limita=ons Can only handle text so far.. File/Image akachments What we see: name of path (e.g., c:\boot.ini) What machine sends: content of the file Using ACG would be helpful Only works if what you see is really what you send Not the case if displayed text undergone a lot of (proprietary) processing before being sent out. However, base64, SSL, and REST API through HTTPS can be handled. 29

Conclusion Gyrus A correct- behavior based monitoring system. Monitors user- intended text through on- screen UI data, and enforcing WYSIWYS policy. Protect most of text- based user applica=ons with minimal overhead. Its akack- agnos=c defense works for preven=ng future akacks. 30

Ques=ons? Q&A 31