Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleMay 2024
GRASP: Hardening Serverless Applications through Graph Reachability Analysis of Security Policies
WWW '24: Proceedings of the ACM Web Conference 2024Pages 1644–1655https://doi.org/10.1145/3589334.3645436Serverless computing is supplanting past versions of cloud computing as the easiest way to rapidly prototype and deploy applications. However, the reentrant and ephemeral nature of serverless functions only exacerbates the challenge of correctly ...
- research-articleMay 2024
More than just informed: The importance of consent facets in smart homes
CHI '24: Proceedings of the 2024 CHI Conference on Human Factors in Computing SystemsArticle No.: 849, Pages 1–21https://doi.org/10.1145/3613904.3642288Data collection without proper consent is a growing concern as smart home devices gain prevalence. It is especially difficult to obtain consent from incidental users because they may be unaware or feel pressured to consent. To understand what ...
- research-articleNovember 2023
System Auditing for Real-Time Systems
ACM Transactions on Privacy and Security (TOPS), Volume 26, Issue 4Article No.: 50, Pages 1–37https://doi.org/10.1145/3625229System auditing is an essential tool for detecting malicious events and conducting forensic analysis. Although used extensively on general-purpose systems, auditing frameworks have not been designed with consideration for the unique constraints and ...
FAuST: Striking a Bargain between Forensic Auditing’s Security and Throughput
- Muhammad Adil Inam,
- Akul Goyal,
- Jason Liu,
- Jaron Mink,
- Noor Michael,
- Sneha Gaur,
- Adam Bates,
- Wajih Ul Hassan
ACSAC '22: Proceedings of the 38th Annual Computer Security Applications ConferencePages 813–826https://doi.org/10.1145/3564625.3567990System logs are invaluable to forensic audits, but grow so large that in practice fine-grained logs are quickly discarded – if captured at all – preventing the real-world use of the provenance-based investigation techniques that have gained popularity ...
- ArticleSeptember 2022
Equivocal URLs: Understanding the Fragmented Space of URL Parser Implementations
AbstractUniform Resource Locators (URLs) are integral to the Web and have existed for nearly three decades. Yet URL parsing differs subtly among parser implementations, leading to ambiguity that can be abused by attackers. We measure agreement between ...
-
- ArticleSeptember 2022
Towards Efficient Auditing for Real-Time Systems
AbstractSystem auditing is a powerful tool that provides insight into the nature of suspicious events in computing systems, allowing machine operators to detect and subsequently investigate security incidents. While auditing has proven invaluable to the ...
- research-articleApril 2022
Users Can Deduce Sensitive Locations Protected by Privacy Zones on Fitness Tracking Apps
CHI '22: Proceedings of the 2022 CHI Conference on Human Factors in Computing SystemsArticle No.: 448, Pages 1–21https://doi.org/10.1145/3491102.3502136Fitness tracking applications allow athletes to record and share their exercises online, including GPS routes of their activities. However, sharing mobility data potentially raises real-world privacy and safety risks. One strategy to mitigate that risk ...
- research-articleNovember 2021
Validating the Integrity of Audit Logs Against Execution Repartitioning Attacks
CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications SecurityPages 3337–3351https://doi.org/10.1145/3460120.3484551Provenance-based causal analysis of audit logs has proven to be an invaluable method of investigating system intrusions. However, it also suffers from dependency explosion, whereby long-running processes accumulate many dependencies that are hard to ...
- research-articleOctober 2021
μSCOPE: A Methodology for Analyzing Least-Privilege Compartmentalization in Large Software Artifacts
- Nick Roessler,
- Lucas Atayde,
- Imani Palmer,
- Derrick McKee,
- Jai Pandey,
- Vasileios P. Kemerlis,
- Mathias Payer,
- Adam Bates,
- Jonathan M. Smith,
- Andre DeHon,
- Nathan Dautenhahn
RAID '21: Proceedings of the 24th International Symposium on Research in Attacks, Intrusions and DefensesPages 296–311https://doi.org/10.1145/3471621.3471839By prioritizing simplicity and portability, least-privilege engineering has been an afterthought in OS design, resulting in monolithic kernels where any exploit leads to total compromise. μSCOPE (“microscope”) addresses this problem by automatically ...
- research-articleJune 2021
SCIFFS: Enabling Secure Third-Party Security Analytics using Serverless Computing
SACMAT '21: Proceedings of the 26th ACM Symposium on Access Control Models and TechnologiesPages 175–186https://doi.org/10.1145/3450569.3463567Third-party security analytics allow companies to outsource threat monitoring tasks to teams of experts and avoid the costs of in-house security operations centers. By analyzing telemetry data from many clients these services are able to offer enhanced ...
- research-articleDecember 2020
Workflow Integration Alleviates Identity and Access Management in Serverless Computing
ACSAC '20: Proceedings of the 36th Annual Computer Security Applications ConferencePages 496–509https://doi.org/10.1145/3427228.3427665As serverless computing continues to revolutionize the design and deployment of web services, it has become an increasingly attractive target to attackers. These adversaries are developing novel tactics for circumventing the ephemeral nature of ...
- research-articleDecember 2020
On the Forensic Validity of Approximated Audit Logs
ACSAC '20: Proceedings of the 36th Annual Computer Security Applications ConferencePages 189–202https://doi.org/10.1145/3427228.3427272Auditing is an increasingly essential tool for the defense of computing systems, but the unwieldy nature of log data imposes significant burdens on administrators and analysts. To address this issue, a variety of techniques have been proposed for ...
- research-articleDecember 2020
This is Why We Can’t Cache Nice Things: Lightning-Fast Threat Hunting using Suspicion-Based Hierarchical Storage
- Wajih Ul Hassan,
- Ding Li,
- Kangkook Jee,
- Xiao Yu,
- Kexuan Zou,
- Dawei Wang,
- Zhengzhang Chen,
- Zhichun Li,
- Junghwan Rhee,
- Jiaping Gui,
- Adam Bates
ACSAC '20: Proceedings of the 36th Annual Computer Security Applications ConferencePages 165–178https://doi.org/10.1145/3427228.3427255Recent advances in the causal analysis can accelerate incident response time, but only after a causal graph of the attack has been constructed. Unfortunately, existing causal graph generation techniques are mainly offline and may take hours or days to ...
- research-articleNovember 2020
Logging to the Danger Zone: Race Condition Attacks and Defenses on System Audit Frameworks
CCS '20: Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications SecurityPages 1551–1574https://doi.org/10.1145/3372297.3417862For system logs to aid in security investigations, they must be beyond the reach of the adversary. Unfortunately, attackers that have escalated privilege on a host are typically able to delete and modify log events at will. In response to this threat, a ...
- research-articleApril 2020
Valve: Securing Function Workflows on Serverless Computing Platforms
Serverless Computing has quickly emerged as a dominant cloud computing paradigm, allowing developers to rapidly prototype event-driven applications using a composition of small functions that each perform a single logical task. However, many such ...
- research-articleNovember 2019
Charting the Attack Surface of Trigger-Action IoT Platforms
CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications SecurityPages 1439–1453https://doi.org/10.1145/3319535.3345662Internet of Things (IoT) deployments are becoming increasingly automated and vastly more complex. Facilitated by programming abstractions such as trigger-action rules, end-users can now easily create new functionalities by interconnecting their devices ...
- research-articleOctober 2018
Runtime Analysis of Whole-System Provenance
- Thomas Pasquier,
- Xueyuan Han,
- Thomas Moyer,
- Adam Bates,
- Olivier Hermant,
- David Eyers,
- Jean Bacon,
- Margo Seltzer
CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications SecurityPages 1601–1616https://doi.org/10.1145/3243734.3243776Identifying the root cause and impact of a system intrusion remains a foundational challenge in computer security. Digital provenance provides a detailed history of the flow of information within a computing system, connecting suspicious events to their ...
- research-articleOctober 2018
Cross-App Poisoning in Software-Defined Networking
- Benjamin E. Ujcich,
- Samuel Jero,
- Anne Edmundson,
- Qi Wang,
- Richard Skowyra,
- James Landry,
- Adam Bates,
- William H. Sanders,
- Cristina Nita-Rotaru,
- Hamed Okhravi
CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications SecurityPages 648–663https://doi.org/10.1145/3243734.3243759Software-defined networking (SDN) continues to grow in popularity because of its programmable and extensible control plane realized through network applications (apps). However, apps introduce significant security challenges that can systemically ...
- ArticleAugust 2018
Analysis of privacy protections in fitness tracking social networks: you can run, but can you hide?
Mobile fitness tracking apps allow users to track their workouts and share them with friends through online social networks. Although the sharing of personal data is an inherent risk in all social networks, the dangers presented by sharing personal ...
- ArticleAugust 2018
Skill squatting attacks on amazon alexa
- Deepak Kumar,
- Riccardo Paccagnella,
- Paul Murley,
- Eric Hennenfent,
- Joshua Mason,
- Adam Bates,
- Michael Bailey
The proliferation of the Internet of Things has increased reliance on voice-controlled devices to perform everyday tasks. Although these devices rely on accurate speech-recognition for correct functionality, many users experience frequent ...