pentium3 / sys_reading

system paper reading notes
236 stars 12 forks source link

Topic in Security and Privacy #117

Closed pentium3 closed 2 years ago

pentium3 commented 3 years ago

Ref:

https://www.usenix.org/conference/osdi21/presentation/preview-security-privacy

CSCI5271 UMN


1. Security Properties

Two major-topic divisions: System security, Network security Five sub-topic areas: Software security, OS security, Cryptography, Network security, Other security topics(Web, usability, AI, etc.)

Some common Threat Models

How could attackers threat the system?

image

  1. Single-Party; Centralized Trust model All the entities are in the same camp and will follow the protocol. -> will not leak data

  2. Multi-Party; Decentralized Trust model Everybody is on their own. There might be someone potentially malicious and may not follow the protocol. -> could leak data

  3. Multi-Party; Semi-Honest (Honest-but-curious) Multi-Party + Decentralized Trust. But entities are semi-honest(will follow the protocol, but may leak data)

Defense Strategies

How to protect user's Integrity/Confidentiality/Privacy from attacker?

image

2. Encryption / Secure Computation

maybe too expensive(Computation/Communication)...

Encryption

Secure Computation

3. TEE / Memory Protection

Trusted computing: From another perspective: what if I want to run my code on a platform where I don’t fully trust the owner? (eg: un-trusted public cloud) -> establish certain degrees of trust.

Six required technology concepts required by Trusted Computer Group:
• Endorsement key: a 2048-bit RSA public and private key pair, never leaves the chip
• Secure input and output: how do you know you’re talking to the right software?
• Memory curtaining: even OS cannot access 
• Sealed storage: only accessible to certain software/hardware (digital rights management)
• Remote attestation: to detect unauthorized changes
• Trusted Third Party (TTP): two parties both trust

SGX

SGX enclave: image

Memory Access Patterns

Penetration(渗透) Testing & Bug Detection

pentium3 commented 3 years ago

Trends in Security/Privacy conferences

https://zhuanlan.zhihu.com/p/278495714

https://zhuanlan.zhihu.com/p/31635977

https://aegis-readers.github.io/

pentium3 commented 3 years ago

Cryptography

Goal: to provide a “secure channel” between Alice and Bob. The channel should remain secure even though Eve can inspect, modify or drop any message, and control the channel. A secure channel should:

Cryptographic key(加密密钥): A parameter that determines the functional output of a cryptographic algorithm. The only secret part of the cipher is a key.

Symmetric-key crypto

Encryption

mainly uses stream cipher or block cipher.

Encryption protects secrecy, not message integrity. For constant-size encryption, changing the ciphertext just creates a different plaintext.

How to protect integrity?

Hash functions:

Message authentication code(MAC): to confirm that the message came from the stated sender (authenticity) and has not been changed (integrity)

Public-key crypto