I Block You Because I Love You: Social Account .

2y ago
26 Views
2 Downloads
2.23 MB
52 Pages
Last View : 1d ago
Last Download : 3m ago
Upload by : Aydin Oneil
Transcription

I Block You Because I Love You: Social Account Identification AttackAgainst a Website Visitor

Who am I? Takuya Watanabe NTT Secure Platform Laboratories, JapanPh.D. student at Waseda UniversityInterests: Web Sec. / Mobile Sec. / Side-channel Attack / Consumer PrivacyE-mail: watanabe.takuya@lab.ntt.co.jpTwitter: @twatanabe1203 Co-authors Eitaro Shioji (NTT Secure Platform Labs.)Mitsuaki Akiyama (NTT Secure Platform Labs.)Keito Sasaoka (Waseda University)Takeshi Yagi (NTT Security Japan)Tatsuya Mori (Waseda University)2

About this research Privacy threat called "Silhouette“ Our press a.html Twitter's writeup:https://blog.twitter.com/engineering/en us/topics/insights/2018/twitter silhouette.html(or https://t.co/0BQ59NuZ0V) Research Impact Bring up new security problem Remediation of major social web services Support of the SameSite attribute by major browsers3

Widespread Adoption of Social Websetc Internet users have an average of 5 social accounts4

Social Accounts Contain Personal information- Real name- Photo- Location Secret activities- Screen name- Purchase history- Use of porn or dating sitest5

Social Accounts Contain Personal information- Real name- Photo- Location Secret activities- Screen name- Purchase history- Use of porn or dating sitest6

Threat Model: Social Account r The anonymity of a website visitor can be destroyedby identifying the social account. It allows Tracking and stalkingSocial engineeringBlackmailing 7

Technical Background

Same Origin Policyevil.comAttacker’s websiteSocial websTargetHTTP GET script . /script HTTP GET (via JavaScript) Response Response SOPCross-site responses are protected by SOP9

Same Origin Policyevil.comAttacker’s websiteSocial websTargetHTTP GET script . /script RTT(ms)HTTP GET (via JavaScript) Response The required time (i.e. RTT) can be measured10

Key Idea: Visibility Control by User BlockingBobBlockhimJohnJohn SmithNonblockedBobBlockedYou are blockedby John Smith11

Non-blockedBlocked12

Key Idea: Visibility Control by User BlockingHTTP GEThttps://sns.eample.com/john smith(URL of user page)Non-blockedBlockedJohn SmithYou are blockedby John SmithRTT Ta msRTT Tb ms13

Key Idea: Visibility Control by User BlockingHTTP GETAccounts preparedby an attacker can hold a binary state ofhttps://sns.com/john smithblocking/non-blocking(URLwithrespectof userpage) to an arbitrary userNon-blockedBlockedJohn SmithYou are blockedby John SmithRTT Ta msRTT Tb ms14

User Identification Attack

Attack FlowI. Side-Channel Control PhaseTo construct user-identifiable side-channel data throughuser blocking featureRequired just once before performing the attackII. Side-Channel Retrieval PhaseTo identify the user accounts utilizing the data retrievedthrough the timing side channelExecuted every time a user accesses the attacker’s website16

Side-Channel Control Phase17

Side-Channel Control Phase18

Side-Channel Control Phase19

Side-Channel Control PhasePrepared by an attacker20

Side-Channel Control PhaseAn attacker needs to prepare only m signalingaccounts to cover 2m targets21

Side-Channel Control Phase22

Side-Channel Retrieval Phase23

Side-Channel Retrieval Phase24

Side-Channel Retrieval Phase25

Side-Channel Retrieval Phase26

Side-Channel Retrieval Phase27

Aren’t RTTs dependent on user environment? Our method prepares 2 extra accounts:Closed account blocks all users included in the list of targetsOpen account does not block any users at allClosedaccountAlways blocking himOpenaccountUnknown userin the target listNot blocking anyone It is useful to determine the threshold of RTT28

Estimation Procedure1.A website visitor is forced to send requests to closed/open accounts Repeat 30 times for each account Let C and O be the 5th-percentiles of the RTT values measured for theclosed/open accounts, respectively2.The visitor is forced to send requests to signaling accounts Repeat k times for each account Let Rj be the 5th-percentile of the RTT values measured for the j-thsignaling account, Sj3.The attacker estimates the visitor's status and retrieves bit array The visitor is blocked by Sj if Rj is closer to C than O The visitor is non-blocked by Sj if Rj is closer to O than C29

Extensions Error-correction Coding A few estimation errors can be corrected efficiently We adopt the Reed-Solomon code in this work Just add redundant bits for each target User-space Partitioning The size of the target list of our attack can be constrained by themaximum blocks of the service. The target list is enlarged by partitioning the user space andrunning an additional measurement stage.Detailed in the whitepaper30

Demo

Field Experiments

Distinguishability of RTTs The success of our attack depends on distinguishability ofRTTs for blocking and non-blocking accountsDistributions of RTTs for blocking and non-blockingin Facebook33

Impact on the Real World We tested whether the RTTs for blocking/non-blockingaccounts were statistically distinguishable in popular services Applying Mann-Whitney U test Distinguishable if p-value 0.01 We found at least 12 popular services are vulnerableSNSFacebook, Twitter, Tumblr, Instagram, Google , MediumAuctioneBayGameXbox Live, RobloxDating and PornPornHub, Xvideos, Ashley Madison34

Accuracy of estimating a single bitTBR: The rate of detecting the blocking user as a blockingTNBR: The rate of detecting the non-blocking user as a non-blockingFacebookk (# of 001.001.001.001.00301.001.001.001.001.001.00It was negligible to be affected by the PC performance and the browser type35

Attack Success Rate in the Wild Use 20 real accounts as targets In Facebook, Twitter, and Tumblr Assign random 24 bits for each account Covering maximum 224 targets Add redundant 8 bits for the Reed-Solomon code With 4-bits block length, which enables it to collect one block error# of accounts used for this experimentAn attacker-controlledTarget 4852Twitter2024852Tumblr202485236

Attack Success Rate in the Wild (cont.) Use three different network environments Wired LAN, Wi-Fi, and ngSuccess rate0.95(19/20)1.00(20/20)1.00(20/20)Success rate(with ure case 502 response are returned over 1 second One bit error occurred, but it was correctedUltimately, user identification attack succeeded in all cases37

Time to Complete the Attack38

Time to Complete the Attack100% success rate in FacebookBit length: 24Total number of requests: 132Time required: 4-8 sec39

Time to Complete the Attack100% success rate in TwitterBit length: 24Total number of requests: 300Time required: 12-37 sec40

Discussions

Pioneer WorkG. Wondracek, T. Holz, E. Kirda, and C. Kruegel, “A Practical Attack to De-anonymize Social Network Users”in IEEE S&P '10 has a similar goal combines group membership information depends on the “history stealing attack” Our workno longer feasible in the latest browsersto the best of our knowledge leverages the user blocking mechanism perfectly attacker-controllable employs the cross-site timing attack conventional, but even still available demonstrates for the widespread type of web services SNS, Shopping, Game, Dating, and Porn42

Visibility Control in Social Webs Other feature whose visibility of a user is changed FriendshipMembership of user groupImage sharing BlockingInvitationSubscribeAttacker controllableYesYesNoNotice to targetNoYesYesRequire approval actionNoDependsYes User blocking tends not to have a limit (rate limit, upper limit)43

Mobile Environment The RTTs can be identified even with the mobile browser Users of mobile platforms typically access social webservices through dedicated mobile apps The mobile attack is established under some assumptions Social plugin Single Sign On Webview44

Defenses and Our Efforts

Possible Defenses Web Services Same-site attribute Place holder page Intentional delay Browser vendors Same-site attribute Interrupting anomaly requests Intentional delay Users Secret mode Sign out NoScript46

Typical CSRF defense Verify referer or CSRF tokenReferer:example.com https://example.com/post.phpReferer:evil.com Concern: Profile pages are often accessed from other sites Referer:google.comvia search resulthttps://twitter.com/twatanabe120347

SameSite Attribute An option proposed by google to prevent the browser from sendingthis cookie along with cross-site requests Usage: Set-Cookie: sid xxxx; path /; samesite laxorSet-Cookie: sid xxxx; path /; samesite strict Case of “samesite lax”cookie removedvia JavaScriptwith a cookie forexample2.comvisitexample1.com via linkexample2.com At first, browsers other than Chromium did not support the SameSiteattribute.48

Responsible Disclosure Twitter have adopted Same-site Cookies and Referer-based defense- The latter principle is similar to place holder page Major browsers have supported Same-site Cookies- The result of the request by us and Twitter supported unsupportedhttps://caniuse.com/#feat same-site-cookie-attribute Several other services are also finished implementing defenses**We do not have permission to mention the brand names49

Summary We presented a practical side-channel attack that identifiesthe social account of a website visitor At least 12 services are vulnerable It archives 100% success rate and takes as short as 4-8 sec It exploits the user-blocking mechanism, or the visibilitycontrol property, commonly available in most social webservices today We have successfully addressed this attack by collaborativeworking with service providers and browser vendors.50

Takeaways It should be noted that Internet users can be destroyed theiranonymity by unexpected ways when using social web services. A feature that enables to control the visibility of other users like userblocking can introduce new information leakage paths to attackers. With all of the major browsers adopting the SameSite attribute, webdevelopers obtained a robust means to prevent CSRF (includingside-channel attacks).51

Technical Background. 9 Same Origin Policy Attacker’s website Target Social webs SOP Cross-site responses are protected by SOP HTTP GET . Facebook Twitter Tumblr k (# of trials) TBR TNBR TBR TNBR TBR TNBR 1 1.00 0.98 0.99 0.99 0.67 0.99

Related Documents:

Texts of Wow Rosh Hashana II 5780 - Congregation Shearith Israel, Atlanta Georgia Wow ׳ג ׳א:׳א תישארב (א) ׃ץרֶָֽאָּהָּ תאֵֵ֥וְּ םִימִַׁ֖שַָּה תאֵֵ֥ םיקִִ֑לֹאֱ ארָָּ֣ Îָּ תישִִׁ֖ארֵ Îְּ(ב) חַורְָּ֣ו ם

Snatch Block, Shackle 6:24 Snatch Block, Hook 6:24 Snatch Block, others (page 6:29) 6:25 Tilt Wall Block 6:26 Oilfield Blocks 6:27 - 6:30 Tubing Block 6:27 Manhandler Block 6:28 Derrick Block 6:28 Laydown Block 6:29 Tong Line Block 6:30 Hay Fork Pulley 6:30 Guyline Block 6:30 J-Latches 6:31 T

Spring 2018 :: CSE 502 Simple Interleaved Main Memory Divide memory into n banks, “interleave” addresses across them so that cache-block A is –in bank “A mod n” –at block “A div n” Can access one bank while another one is busy Bank 0 Bank 1 Bank 2 Bank n Block in bank Bank Block 0 Block n Block 2n Block 1 Block n 1 Block .

Drawing Block Title - 03 Grids 1:12 014200-003 Drawing Block Title - 04 Grids 1:16 014200-004 Drawing Block Title - 05 Grids 1:20 014200-005 Drawing Block Title - 06 Grids 1:24 014200-006 Drawing Block Title - 07 Grids 1:28 014200-007 Drawing Block Title - 08 Grids 1:32 014200-008 Drawing Block Title - 09 Grids 1:36 014200-009 Drawing Block .

Block 6: 2 block failures and 10 re-examinations Block 7: 1 block failure and 3 re-examinations Block 8: 1 block failure and 2 re-examinations -nine students successfully remediated a failed block in the summer Comment: Although we could aspire to zero block failures and zero re-examinations, some failures and re-examinations are

12. Sew together (1) Block One square, (1) Block Five rectangle, (1) Block One square, (1) Block Six rectangle and (1) Block One square, in that order from left to right. Sew the newly sewn strip to the top of the Center Block. D D DD Unit 1 Block One make 6 3. Sew (1) 1" x 8 ½" Fabric D strip to each side of (1) Unit 1 square. Sew (1) 1 .

283 1957-1967 Small Block 302 1967-1969 Small Block 305 1976-Date Small Block 307 1968-1973 Small Block 327 1962-1969 Small Block 348 1958-1961 W Series 350 1967-Date Small Block . Engine suffix codes listed for 366 and 427 engines, where the automobile type is identified as “TR”, are truck big block engines. .

You’ll then be able to insert the entire drawing Note: If you want to use the Design Center to insert the Dynamic Block (which you would do for a block library drawing with more than one Dynamic Block), choose the block you want to edit. Figure 2: The Edit Block Definition dialog box If the block is dynami