Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3460120.3484551acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article
Public Access

Validating the Integrity of Audit Logs Against Execution Repartitioning Attacks

Published: 13 November 2021 Publication History
  • Get Citation Alerts
  • Abstract

    Provenance-based causal analysis of audit logs has proven to be an invaluable method of investigating system intrusions. However, it also suffers from dependency explosion, whereby long-running processes accumulate many dependencies that are hard to unravel. Execution unit partitioning addresses this by segmenting dependencies into units of work, such as isolating the events that processed a single HTTP request. Unfortunately, we discover that current designs have a semantic gap problem due to how system calls and application log messages are used to infer complex internal program states. We demonstrate how attackers can modify existing code exploits to control event partitioning, breaking links in the attack and framing innocent users. We also show how our techniques circumvent existing program and log integrity defenses.
    We then propose a new design for execution unit partitioning that leverages additional runtime data to yield verified partitions that resist manipulation. Our design overcomes the technical challenges of minimizing additional overhead while accurately connecting low level code instructions to high level audit events, in part with the use of commodity hardware processor tracing. We implement a prototype of our design for Linux, MARSARA, and extensively evaluate it on 14 real-world programs, targeted with expertly crafted exploits. MARSARA's verified partitions successfully capture all the attack provenances while only reintroducing 2.82% of false dependencies, in the worst case, with an average overhead of 8.7%. Using a new metric called Partitioning Attack Surface, we show that MARSARA eliminates 47,642 more repartitioning gadgets per program than integrity defenses like CFI, demonstrating our prototype's effectiveness and the novelty of the attacks it prevents.

    References

    [1]
    Mart'in Abadi, Mihai Budiu, Úlfar Erlingsson, and Jay Ligatti. 2005. Control-flow Integrity. In Proceedings of the 12th ACM Conference on Computer and Communications Security.
    [2]
    Adam Bates, Kevin Butler, Andreas Haeberlen, Micah Sherr, and Wenchao Zhou. 2014. Let SDN Be Your Eyes: Secure Forensics in Data Center Networks. In NDSS Workshop on Security of Emerging Networking Technologies (SENT'14 ).
    [3]
    Adam Bates, Kevin R. B. Butler, and Thomas Moyer. 2015a. Take Only What You Need: Leveraging Mandatory Access Control Policy to Reduce Provenance Storage Costs. In 7th Workshop on the Theory and Practice of Provenance (Edinburgh, Scotland) (TaPP'15).
    [4]
    Adam Bates, Wajih Ul Hassan, Kevin R.B. Butler, Alin Dobra, Bradley Reaves, Patrick Cable, Thomas Moyer, and Nabil Schear. 2017a. Transparent Web Service Auditing via Network Provenance Functions. In 26th World Wide Web Conference (WWW'17). Perth, Australia.
    [5]
    Adam Bates, Dave Tian, Kevin R.B. Butler, and Thomas Moyer. 2015b. Trustworthy Whole-System Provenance for the Linux Kernel. In Proceedings of 24th USENIX Security Symposium (Washington, D.C.).
    [6]
    Adam Bates, Dave Tian, Grant Hernandez, Thomas Moyer, Kevin R.B. Butler, and Trent Jaeger. 2017b. Taming the Costs of Trustworthy Provenance through Policy Reduction. ACM Trans. on Internet Technology, Vol. 17, 4 (sep 2017), 34:1--34:21.
    [7]
    Mihir Bellare and Bennet Yee. 1997. Forward integrity for secure audit logs. Technical Report. Computer Science and Engineering Department, University of California at San Diego.
    [8]
    Y. Ben, Y. Han, N. Cai, W. An, and Z. Xu. 2018. T-Tracker: Compressing System Audit Log by Taint Tracking. In 2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS). 1--9. https://doi.org/10.1109/PADSW.2018.8645035
    [9]
    Andrea Bittau, Adam Belay, Ali Mashtizadeh, David Mazières, and Dan Boneh. 2014. Hacking Blind. In Proceedings of the 35th IEEE Symposium on Security and Privacy.
    [10]
    Tyler Bletsch, Xuxian Jiang, Vince W. Freeh, and Zhenkai Liang. 2011. Jump-Oriented Programming: A New Class of Code-reuse Attack. In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security.
    [11]
    Michelle A Borkin, Azalea A Vo, Zoya Bylinskii, Phillip Isola, Shashank Sunkavalli, Aude Oliva, and Hanspeter Pfister. 2013a. What makes a visualization memorable? IEEE Transactions on Visualization and Computer Graphics, Vol. 19, 12 (2013), 2306--2315.
    [12]
    Michelle A Borkin, Chelsea S Yeh, Madelaine Boyd, Peter Macko, Krzysztof Z Gajos, Margo Seltzer, and Hanspeter Pfister. 2013b. Evaluation of filesystem provenance visualization tools. IEEE Transactions on Visualization and Computer Graphics, Vol. 19, 12 (2013), 2476--2485.
    [13]
    Erik Bosman and Herbert Bos. 2014. Framing Signals - A Return to Portable Shellcode. In Proceedings of the 35th IEEE Symposium on Security and Privacy.
    [14]
    Frank Capobianco, Christian Skalka, and Trent Jaeger. 2017. ACCESSPROV: Tracking the Provenance of Access Control Decisions. In 9th USENIX Workshop on the Theory and Practice of Provenance (TaPP 2017).
    [15]
    Carbon Black. 2018. Global Incident Response Threat Report. https://www.carbonblack.com/global-incident-response-threat-report/november-2018/. Last accessed 04--20--2019.
    [16]
    Nicholas Carlini, Antonio Barresi, Mathias Payer, David Wagner, and Thomas R. Gross. 2015. Control-Flow Bending: On the Effectiveness of Control-Flow Integrity. In Proceedings of the 24th USENIX Security Symposium.
    [17]
    Adriane Chapman, H.V. Jagadish, and Prakash Ramanan. 2008. Efficient Provenance Storage. In Proceedings of the 2008 ACM Special Interest Group on Management of Data Conference (Vancouver, Canada) (SIGMOD'08).
    [18]
    Stephen Checkoway, Lucas Davi, Alexandra Dmitrienko, Ahmad-Reza Sadeghi, Hovav Shacham, and Marcel Winandy. 2010. Return-Oriented Programming Without Returns. In Proceedings of the 17th ACM Conference on Computer and Communications Security.
    [19]
    Ang Chen, Andreas Haeberlen, Wenchao Zhou, and Boon Thau Loo. 2017a. One Primitive to Diagnose Them All: Architectural Support for Internet Diagnostics. In Proceedings of the Twelfth European Conference on Computer Systems (Belgrade, Serbia) (EuroSys '17). ACM, New York, NY, USA, 374--388. https://doi.org/10.1145/3064176.3064212
    [20]
    Ang Chen, Yang Wu, Andreas Haeberlen, Wenchao Zhou, and Boon Thau Loo. 2015. Differential Provenance: Better Network Diagnostics with Reference Events. In Proceedings of the 14th ACM Workshop on Hot Topics in Networks (HotNets'15) (Philadelphia, PA).
    [21]
    Ang Chen, Yang Wu, Andreas Haeberlen, Wenchao Zhou, and Boon Thau Loo. 2016. The Good, the Bad, and the Differences: Better Network Diagnostics with Differential Provenance. In Proceedings of the 2016 ACM SIGCOMM Conference (Florianopolis, Brazil) (SIGCOMM '16). ACM, New York, NY, USA, 115--128. https://doi.org/10.1145/2934872.2934910
    [22]
    Chen Chen, Harshal Tushar Lehri, Lay Kuan Loh, Anupam Alur, Limin Jia, Boon Thau Loo, and Wenchao Zhou. 2017b. Distributed Provenance Compression. In Proceedings of the 2017 ACM International Conference on Management of Data (Chicago, Illinois, USA) (SIGMOD '17). ACM, New York, NY, USA, 203--218. https://doi.org/10.1145/3035918.3035926
    [23]
    Catalin Cimpanu. [n.d.]. Hackers are increasingly destroying logs to hide attacks. https://www.zdnet.com/article/hackers-are-increasingly-destroying-logs-to-hide-attacks/. Last accessed 04--20--2019.
    [24]
    Scott A. Crosby and Dan S. Wallach. 2009. Efficient data structures for tamper-evident logging. In In Proceedings of the 18th USENIX Security Symposium.
    [25]
    David Devecsery, Michael Chow, Xianzheng Dou, Jason Flinn, and Peter M Chen. 2014. Eidetic systems. In 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI 14). 525--540.
    [26]
    Apache Software Foundation. [n.d.]. Apache HTTP server benchmarking tool. https://httpd.apache.org/docs/2.4/programs/ab.html.
    [27]
    Xinyang Ge, Weidong Cui, and Trent Jaeger. 2017. Griffin: Guarding control flows using intel processor trace. In ACM SIGARCH Computer Architecture News, Vol. 45. ACM, 585--598.
    [28]
    Ashish Gehani, Minyoung Kim, and Jian Zhang. 2009. Steps Toward Managing Lineage Metadata in Grid Clusters. In 1st Workshop on the Theory and Practice of Provenance (San Francisco, CA) (TaPP'09).
    [29]
    Ashish Gehani and Dawood Tariq. 2012. SPADE: Support for Provenance Auditing in Distributed Environments. In Proceedings of the 13th International Middleware Conference (Montreal, Quebec, Canada) (Middleware '12).
    [30]
    Ben Gras, Kaveh Razavi, Erik Bosman, Herbert Bos, and Cristiano Giuffrida. 2017. ASLR on the Line: Practical Cache Attacks on the MMU. In Proceedings of the 24th Annual Network and Distributed System Security Symposium.
    [31]
    Steve Hales. [n.d.]. Last Door Log Wiper. https://packetstormsecurity.com/files/118922/LastDoor.tar. Last accessed 04--20--2019.
    [32]
    Gunnar Hartung, Björn Kaidel, Alexander Koch, Jessica Koch, and Dominik Hartmann. 2017. Practical and Robust Secure Logging from Fault-Tolerant Sequential Aggregate Signatures. In Proc. of the International Conference on Provable Security (ProvSec).
    [33]
    Wajih Ul Hassan, Nuraini Aguse, Mark Lemay, Thomas Moyer, and Adam Bates. 2018. Towards Scalable Cluster Auditing through Grammatical Inference over Provenance Graphs. In Proceedings of the 25th ISOC Network and Distributed System Security Symposium (NDSS'18). San Diego, CA, USA.
    [34]
    Wajih Ul Hassan, Adam Bates, and Daniel Marino. 2020 a. Tactical Provenance Analysis for Endpoint Detection and Response Systems. In 41st IEEE Symposium on Security and Privacy (SP) (Oakland'20).
    [35]
    Wajih Ul Hassan, Shengjian Guo, Ding Li, Zhengzhang Chen, Kangkook Jee, Zhichun Li, and Adam Bates. 2019. NoDoze: Combatting Threat Alert Fatigue with Automated Provenance Triage. In 26th ISOC Network and Distributed System Security Symposium (NDSS'19).
    [36]
    Wajih Ul Hassan, Mohammad Noureddine, Pubali Datta, and Adam Bates. 2020 b. OmegaLog: High-Fidelity Attack Investigation via Transparent Multi-layer Log Analysis. In 27th ISOC Network and Distributed System Security Symposium (NDSS'20).
    [37]
    Jason E. Holt. 2006. Logcrypt: Forward Security and Public Verification for Secure Audit Logs. In Proc. of the Australasian Information Security Workshop (AISW-NetSec).
    [38]
    Md Nahid Hossain, Sadegh M. Milajerdi, Junao Wang, Birhanu Eshete, Rigel Gjomemo, R. Sekar, Scott Stoller, and V.N. Venkatakrishnan. 2017. SLEUTH: Real-time Attack Scenario Reconstruction from COTS Audit Data. In 26th USENIX Security Symposium (USENIX Security 17). USENIX Association, Vancouver, BC, 487--504. https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/hossain
    [39]
    Hong Hu, Chenxiong Qian, Carter Yagemann, Simon Pak Ho Chung, William R Harris, Taesoo Kim, and Wenke Lee. 2018. Enforcing unique code target property for control-flow integrity. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. 1470--1486.
    [40]
    Hong Hu, Shweta Shinde, Sendroiu Adrian, Zheng Leong Chua, Prateek Saxena, and Zhenkai Liang. 2016. Data-oriented programming: On the expressiveness of non-control data attacks. In IEEE Symposium on Security and Privacy. IEEE, 969--986.
    [41]
    IBM Knowledge Center. [n.d.]. Storage and analysis of audit logs. https://www.ibm.com/support/knowledgecenter/en/SSEPGG_11.1.0/com.ibm.db2.luw.admin.sec.doc/doc/c0052328.html. Last accessed 04--20--2019.
    [42]
    Yang Ji, Sangho Lee, Evan Downing, Weiren Wang, Mattia Fazzini, Taesoo Kim, Alessandro Orso, and Wenke Lee. 2017. RAIN: Refinable Attack Investigation with On-Demand Inter-Process Information Flow Tracking. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (Dallas, Texas, USA) (CCS '17). Association for Computing Machinery, New York, NY, USA, 377--390. https://doi.org/10.1145/3133956.3134045
    [43]
    JustLinux Forums. [n.d.]. server hacked!! /var/log deleted. how can i trace hacker!?! http://forums.justlinux.com/showthread.php?123851-server-hacked-var-log-deleted-how-can-i-trace-hacker. Last accessed 04--20--2019.
    [44]
    Vishal Karande, Erick Bauman, Zhiqiang Lin, and Latifur Khan. 2017. SGX-Log: Securing System Logs With SGX. In Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security (ASIA CCS '17).
    [45]
    Kent Karen and Souppaya Murugiah. 2006. NIST Special Publication 800--92, Guide to Computer Security Log Management.
    [46]
    Taesoo Kim, Xi Wang, Nickolai Zeldovich, and M. Frans Kaashoek. 2010. Intrusion Recovery Using Selective Re-execution. In OSDI. USENIX Association. http://dl.acm.org/citation.cfm?id=1924943.1924950
    [47]
    Samuel T. King and Peter M. Chen. 2003. Backtracking Intrusions. In Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles (Bolton Landing, NY, USA) (SOSP '03). ACM, New York, NY, USA, 223--236. https://doi.org/10.1145/945445.945467
    [48]
    Yonghwi Kwon, Dohyeong Kim, William Nick Sumner, Kyungtae Kim, Brendan Saltaformaggio, Xiangyu Zhang, and Dongyan Xu. 2016. LDX: Causality Inference by Lightweight Dual Execution. In Proceedings of the Twenty-First International Conference on Architectural Support for Programming Languages and Operating Systems (Atlanta, Georgia, USA) (ASPLOS '16). ACM, New York, NY, USA, 503--515. https://doi.org/10.1145/2872362.2872395
    [49]
    Yonghwi Kwon, Fei Wang, Weihang Wang, Kyu Hyung Lee, Wen-Chuan Lee, Shiqing Ma, Xiangyu Zhang, Dongyan Xu, Somesh Jha, Gabriela Ciocarlie, Ashish Gehani, and Vinod Yegneswaran. 2018. MCI: Modeling-based Causality Inference in Audit Logging for Attack Investigation. In Proc. of the 25th Network and Distributed System Security Symposium (NDSS'18).
    [50]
    Kyu Hyung Lee, Xiangyu Zhang, and Dongyan Xu. 2013a. High Accuracy Attack Provenance via Binary-based Execution Partition. In Proceedings of NDSS '13 (San Diego, CA).
    [51]
    Kyu Hyung Lee, Xiangyu Zhang, and Dongyan Xu. 2013b. LogGC: Garbage Collecting Audit Log. In Proceedings of the 2013 ACM SIGSAC conference on Computer and Communications Security (Berlin, Germany) (CCS '13). ACM, New York, NY, USA, 1005--1016. https://doi.org/10.1145/2508859.2516731
    [52]
    Yushan Liu, Mu Zhang, Ding Li, Kangkook Jee, Zhichun Li, Zhenyu Wu, Junghwan Rhee, and Prateek Mittal. 2018. Towards a Timely Causality Analysis for Enterprise Security. In Proceedings of the 25th ISOC Network and Distributed System Security Symposium (NDSS'18). San Diego, CA, USA.
    [53]
    Kangjie Lu, Stefan Nürnberger, Michael Backes, and Wenke Lee. 2016. How to Make ASLR Win the Clone Wars: Runtime Re-Randomization. In Proceedings of the 23rd Annual Network and Distributed System Security Symposium.
    [54]
    Kangjie Lu, Chengyu Song, Byoungyoung Lee, Simon P. Chung, Taesoo Kim, and Wenke Lee. 2015. ASLR-Guard: Stopping Address Space Leakage for Code Reuse Attacks. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security.
    [55]
    Di Ma and Gene Tsudik. 2009. A new approach to secure logging. ACM Transactions on Storage (TOS), Vol. 5, 1 (2009).
    [56]
    Shiqing Ma, Kyu Hyung Lee, Chung Hwan Kim, Junghwan Rhee, Xiangyu Zhang, and Dongyan Xu. 2015. Accurate, Low Cost and Instrumentation-Free Security Audit Logging for Windows. In Proceedings of the 31st Annual Computer Security Applications Conference (Los Angeles, CA, USA) (ACSAC 2015). ACM, New York, NY, USA, 401--410. https://doi.org/10.1145/2818000.2818039
    [57]
    Shiqing Ma, Juan Zhai, Yonghwi Kwon, Kyu Hyung Lee, Xiangyu Zhang, Gabriela Ciocarlie, Ashish Gehani, Vinod Yegneswaran, Dongyan Xu, and Somesh Jha. 2018. Kernel-Supported Cost-Effective Audit Logging for Causality Tracking. In 2018 USENIX Annual Technical Conference (USENIX ATC 18). USENIX Association, Boston, MA, 241--254. https://www.usenix.org/conference/atc18/presentation/ma-shiqing
    [58]
    Shiqing Ma, Juan Zhai, Fei Wang, Kyu Hyung Lee, Xiangyu Zhang, and Dongyan Xu. 2017. MPI: Multiple Perspective Attack Investigation with Semantic Aware Execution Partitioning. In 26th USENIX Security Symposium.
    [59]
    Shiqing Ma, Xiangyu Zhang, and Dongyan Xu. 2016. ProTracer: Towards Practical Provenance Tracing by Alternating Between Logging and Tainting. In Proceedings of NDSS '16 (San Diego, CA).
    [60]
    S. Momeni Milajerdi, R. Gjomemo, B. Eshete, R. Sekar, and V. Venkatakrishnan. 2019. HOLMES: Real-Time APT Detection through Correlation of Suspicious Information Flows. In 2019 2019 IEEE Symposium on Security and Privacy (SP). IEEE Computer Society, Los Alamitos, CA, USA. https://doi.org/10.1109/SP.2019.00026
    [61]
    Santosh Nagarakatte, Jianzhou Zhao, Milo M.K. Martin, and Steve Zdancewic. 2009. SoftBound: Highly Compatible and Complete Spatial Memory Safety for C. In Proceedings of the 30th ACM SIG-PLAN Conference on Programming Language Design and Implementation.
    [62]
    National Institute of Standards and Technology. 2013. NIST Special Publication 800--53 (Rev. 4), Security Controls and Assessment Procedures for Federal Information Systems and Organizations.
    [63]
    Ben Niu and Gang Tan. 2014. Modular Control-flow Integrity. In Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation.
    [64]
    Robert O'Callahan, Chris Jones, Nathan Froyd, Kyle Huey, Albert Noll, and Nimrod Partush. 2017. Engineering record and replay for deployability. In 2017 USENIX Annual Technical Conference (USENIX ATC 17). 377--389.
    [65]
    OccupytheWeb. 2013. How to Cover Your Tracks & Leave No Trace Behind on the Target System. https://tinyurl.com/yygqte9p. Last accessed 04--20--2019.
    [66]
    Riccardo Paccagnella, Pubali Datta, Wajih Ul Hassan, Adam Bates, Christopher W. Fletcher, Andrew Miller, and Dave Tian. 2020 a. Custos: Practical Tamper-Evident Auditing of Operating Systems Using Trusted Execution. In 27th ISOC Network and Distributed System Security Symposium (NDSS'20).
    [67]
    Riccardo Paccagnella, Kevin Liao, Dave (Jing) Tian, and Adam Bates. 2020 b. Logging to the Danger Zone: Race Condition Attacks and Defenses on System Audit Frameworks. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security (CCS'20).
    [68]
    Jaehong Park, Dang Nguyen, and R. Sandhu. 2012. A Provenance-Based Access Control Model. In Proceedings of the 10th Annual International Conference on Privacy, Security and Trust (PST). 137--144. https://doi.org/10.1109/PST.2012.6297930
    [69]
    PaX Team. 2003. PaX Address Space Layout Randomization (ASLR). http://pax.grsecurity.net/docs/aslr.txt.
    [70]
    D.J. Pohly, S. McLaughlin, P. McDaniel, and K. Butler. 2012. Hi-Fi: Collecting High-Fidelity Whole-System Provenance. In Proceedings of the 2012 Annual Computer Security Applications Conference (ACSAC '12). Orlando, FL, USA.
    [71]
    Tobias Pulls and Roel Peeters. 2015. Balloon: A forward-secure append-only persistent authenticated data structure. In Proc. of the European Symposium on Research in Computer Security (ESORICS).
    [72]
    Rapid7. [n.d.]. Metasploit, the world's most used penetration testing framework. https://www.metasploit.com/. Last accessed 04--20--2019.
    [73]
    Bruce Schneier and John Kelsey. 1998. Cryptographic Support for Secure Logs on Untrusted Machines. In Proc. of the USENIX Security Symposium (USENIX).
    [74]
    Bruce Schneier and John Kelsey. 1999. Secure audit logs to support computer forensics. ACM Transactions on Information and System Security (TISSEC) (1999).
    [75]
    Hovav Shacham. 2007. The Geometry of Innocent Flesh on the Bone: Return-into-libc Without Function Calls (on the x86). In Proceedings of the 14th ACM Conference on Computer and Communications Security.
    [76]
    Yan Shoshitaishvili, Ruoyu (Fish) Wang, Andrew Dutcher, Christophe Hauser, John Grosen, Chris Salls, Nick Stephens, Nilo Redini, Christopher Kruegel, and Giovanni Vigna. 2017. angr, a binary analysis framework. http://angr.io/.
    [77]
    Kevin Z. Snow, Fabian Monrose, Lucas Davi, Alexandra Dmitrienko, Christopher Liebchen, and Ahmad-Reza Sadeghi. 2013. Just-In-Time Code Reuse: On the Effectiveness of Fine-Grained Address Space Layout Randomization. In Proceedings of the 34th IEEE Symposium on Security and Privacy.
    [78]
    Yutao Tang, Ding Li, Zhichun Li, Mu Zhang, Kangkook Jee, Xusheng Xiao, Zhenyu Wu, Junghwan Rhee, Fengyuan Xu, and Qun Li. 2018. NodeMerge: Template Based Efficient Data Reduction For Big-Data Causality Analysis. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (Toronto, Canada) (CCS '18). ACM, New York, NY, USA, 1324--1337. https://doi.org/10.1145/3243734.3243763
    [79]
    Dawood Tariq, Maisem Ali, and Ashish Gehani. 2012. Towards Automated Collection of Application-Level Data Provenance. In 4th USENIX Workshop on the Theory and Practice of Provenance. USENIX, Boston, MA. https://www.usenix.org/conference/tapp12/workshop-program/presentation/Tariq
    [80]
    The MITRE Corporation. 2017. CAPEC-81: Web Logs Tampering. https://capec.mitre.org/data/definitions/81.html. Last accessed 04--20--2019.
    [81]
    Caroline Tice, Tom Roeder, Peter Collingbourne, Stephen Checkoway, Úlfar Erlingsson, Luis Lozano, and Geoff Pike. 2014. Enforcing Forward-edge Control-flow Integrity in GCC & LLVM. In Proceedings of the 23rd USENIX Security Symposium.
    [82]
    Valgrind Developers. 2017. Valgrind. http://www.valgrind.org/.
    [83]
    Victor van der Veen, Enes Goktas, Moritz Contag, Andre Pawlowski, Xi Chen, Sanjay Rawat, Herbert Bos, Thorsten Holz, Elias Athanasopoulos, and Cristiano Giuffrida. 2016. A Tough Call: Mitigating Advanced Code-Reuse Attacks at the Binary Level. In Proceedings of the 37th IEEE Symposium on Security and Privacy.
    [84]
    Qi Wang, Wajih Ul Hassan, Adam Bates, and Carl Gunter. 2017. Fear and Logging in the Internet of Things. In Proceedings of the 25th ISOC Network and Distributed System Security Symposium (NDSS'18).
    [85]
    Qi Wang, Wajih Ul Hassan, Ding Li, Kangkook Jee, Xiao Yu, Kexuan Zou, Jungwhan Rhee, Zhengzhang Zhen, Wei Cheng, Carl A. Gunter, and Haifeng chen. 2020. You Are What You Do: Hunting Stealthy Malware via Data Provenance Analysis. In 27th ISOC Network and Distributed System Security Symposium (NDSS'20).
    [86]
    Yulai Xie, Dan Feng, Zhipeng Tan, Lei Chen, Kiran-Kumar Muniswamy-Reddy, Yan Li, and Darrell D.E. Long. 2012. A Hybrid Approach for Efficient Provenance Storage. In Proceedings of the 21st ACM International Conference on Information and Knowledge Management (Maui, Hawaii, USA) (CIKM '12).
    [87]
    Yulai Xie, Kiran-Kumar Muniswamy-Reddy, Dan Feng, Yan Li, and Darrell D. E. Long. 2013. Evaluation of a Hybrid Approach for Efficient Provenance Storage. Trans. Storage, Vol. 9, 4, Article 14 (Nov. 2013), 29 pages. https://doi.org/10.1145/2501986
    [88]
    Xiaoyang Xu, Masoud Ghaffarinia, Wenhao Wang, Kevin W. Hamlen, and Zhiqiang Lin. 2019. CONFIRM: Evaluating Compatibility and Relevance of Control-flow Integrity Protections for Modern Software. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Santa Clara, CA, 1805--1821. https://www.usenix.org/conference/usenixsecurity19/presentation/xu-xiaoyang
    [89]
    Zhang Xu, Zhenyu Wu, Zhichun Li, Kangkook Jee, Junghwan Rhee, Xusheng Xiao, Fengyuan Xu, Haining Wang, and Guofei Jiang. 2016. High Fidelity Data Reduction for Big Data Security Dependency Analyses. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (Vienna, Austria) (CCS '16). ACM, New York, NY, USA, 504--516. https://doi.org/10.1145/2976749.2978378
    [90]
    Carter Yagemann, Salmin Sultana, Li Chen, and Wenke Lee. 2019. Barnum: Detecting Document Malware via Control Flow Anomalies in Hardware Traces. In International Conference on Information Security. Springer, 341--359.
    [91]
    Attila Altay Yavuz and Peng Ning. 2009. BAF: An efficient publicly verifiable secure audit logging scheme for distributed systems. In Proc. of the Annual Computer Security Applications Conference (ACSAC).
    [92]
    Attila A Yavuz, Peng Ning, and Michael K Reiter. 2012. Efficient, compromise resilient and append-only cryptographic schemes for secure audit logging. In Proc. of the International Conference on Financial Cryptography and Data Security (FC).
    [93]
    Chao Zhang, Tao Wei, Zhaofeng Chen, Lei Duan, Laszlo Szekeres, Stephen McCamant, Dawn Song, and Wei Zou. 2013. Practical Control Flow Integrity and Randomization for Binary Executables. In Proceedings of the 34th IEEE Symposium on Security and Privacy.
    [94]
    Mingwei Zhang and R. Sekar. 2013. Control Flow Integrity for COTS Binaries. In Proceedings of the 22nd USENIX Security Symposium.
    [95]
    Wenchao Zhou, Qiong Fei, Arjun Narayan, Andreas Haeberlen, Boon Thau Loo, and Micah Sherr. 2011. Secure Network Provenance. In ACM Symposium on Operating Systems Principles (SOSP).

    Cited By

    View all
    • (2023)System Auditing for Real-Time SystemsACM Transactions on Privacy and Security10.1145/362522926:4(1-37)Online publication date: 13-Nov-2023
    • (2023)Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response ToolsProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3616580(2396-2410)Online publication date: 15-Nov-2023
    • (2023)SoK: History is a Vast Early Warning System: Auditing the Provenance of System Intrusions2023 IEEE Symposium on Security and Privacy (SP)10.1109/SP46215.2023.10179405(2620-2638)Online publication date: May-2023
    • Show More Cited By

    Index Terms

    1. Validating the Integrity of Audit Logs Against Execution Repartitioning Attacks

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security
        November 2021
        3558 pages
        ISBN:9781450384544
        DOI:10.1145/3460120
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 13 November 2021

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. auditing
        2. execution unit partitioning
        3. processor tracing

        Qualifiers

        • Research-article

        Funding Sources

        Conference

        CCS '21
        Sponsor:
        CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security
        November 15 - 19, 2021
        Virtual Event, Republic of Korea

        Acceptance Rates

        Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

        Upcoming Conference

        CCS '24
        ACM SIGSAC Conference on Computer and Communications Security
        October 14 - 18, 2024
        Salt Lake City , UT , USA

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)278
        • Downloads (Last 6 weeks)20
        Reflects downloads up to 27 Jul 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2023)System Auditing for Real-Time SystemsACM Transactions on Privacy and Security10.1145/362522926:4(1-37)Online publication date: 13-Nov-2023
        • (2023)Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response ToolsProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3616580(2396-2410)Online publication date: 15-Nov-2023
        • (2023)SoK: History is a Vast Early Warning System: Auditing the Provenance of System Intrusions2023 IEEE Symposium on Security and Privacy (SP)10.1109/SP46215.2023.10179405(2620-2638)Online publication date: May-2023
        • (2022)FAuST: Striking a Bargain between Forensic Auditing’s Security and ThroughputProceedings of the 38th Annual Computer Security Applications Conference10.1145/3564625.3567990(813-826)Online publication date: 5-Dec-2022
        • (2022)Transparent DIFC: Harnessing Innate Application Event Logging for Fine-Grained Decentralized Information Flow Control2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P)10.1109/EuroSP53844.2022.00037(487-501)Online publication date: Jun-2022

        View Options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Get Access

        Login options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media