Rice University logo
 
Top blue bar image
A graduate seminar: current topics in computer security
 

Archive for the ‘Uncategorized’ Category


Thanks to PlayThru the CAPTCHA story has come to an end?

December 2nd, 2012 by on1
PlayThru Captcha

PlayThru Captcha

After the lecture we had about moving-object CAPTCHAs I searched about new CAPTCHAs in the hope of observing a new brand of CAPTCHA’s. And I found one!. PlayThru system which has been developed by Are You a Human can be a substitute for cryptic CAPTCHAs. They said “Hieroglyphics were fine for Pharaohs, but your users deserve better”. They, instead of giving an obscure CAPTCHA to solve, give you a simple game to play and if you simply do that you would be recognized as a human. Isn’t this exciting?

In fact the problem is, as the automated systems got better and better at solving CAPTCHAs, the CAPTCHAs had to get tougher, enough so that humans couldn’t always get them right. I encourage you to look at this info graphic which describes the agony that traditional CAPTCHAs provide for users. They believe one in four people fail to decipher current CAPTCHAs on their first attempt. For me, it happened many times I could not solve a CAPTCHA.

Also they state firmly that with PlayThru they defeat CAPTCHA farming; given distorted CAPTCHA, scammers hire humans, usually in developing countries and pay them to solve every CAPTCHA their automated systems encounter or they put it in porn sites which would make enough incentive for people to solve them. Since each CAPTCHA always has the same solution no matter who solves it, or where CAPTCHAs could be solved easily; however with Playthru the human user must actively maneuver the floating icons and There’s no “answer” that could be supplied by someone else. To me it does not seem convincible; scammers can write some codes that take the control of the mouse and deploy the solution for the PlayThru. Obviously it would be a harder tasks but it turns out that it is doable. All they need is some knowledge of moving object recognition.

If you’d like to see the system in action, there’s a working PlayThru demo on the Are You a Human home page. Maybe someday we get rid of those tedious CAPTCHAs.

Using web ads to exfiltrate personal data

December 2nd, 2012 by Tad

By now, most users of internet e-mail clients are used to the disturbingly accurate ads that appear near one’s e-mail.  As is well known, your e-mail is scanned for various key words, and the ads are served up based on the contents of the e-mail.  In principle, this is not supposed to affect the integrity of your e-mail, because the contents of the e-mail are not shared with the advertiser – he only knows that an ad has been served and whether it has been clicked on.

Threat Model

However, further consideration reveals that this approach creates potential leaks of personal information to the advertiser.  Consider, for example, an advertiser who desires to gather certain pieces of personal information on a specific individual.  They know certain publicly available details on the individual, and are able to register an advertiser account with the e-mail / ad provider.  The advertiser can not directly access the user’s account, but can retrieve standard information, such as display counts, for their ads.

Attack

If the attacker chooses keywords in combinations that they are likely only to appear in e-mails to or from the individual in question, then they are able to construct ads that will only be shown when e-mails to or from this individual are displayed.  They may then add keywords containing information that they would like to exfiltrate, and see how frequently their ad is displayed.  If it appears more than a nominal number of times, there is a likelyhood that those keywords are present in the individual’s e-mail.

Example

Suppose, for example, an attacker who suspected that a certain individual worked on a specific, secret project.  They could create an ad account and insert an ad with the individual’s e-mail address and the name of the project as keywords.  If the ad was displayed frequently, it would suggest that the keyword appeared frequently in conjunction with the user, and thus suggest an involvement of the user with the project.

Notes

An ad provider could try to circumvent this sort of attack by only permitting keywords that appear with a certain level of frequency (unlike specific e-mail addresses.)  However, because combinations of common words may be quite rare and distinguishing, such an approach would not be sufficient to block the attack.  Only if the advertiser required frequently appearing keyword combinations could the attack be minimized.  Additionally, it is worth noting that the attack would be easy to disguise from a user, because most advertising agencies / e-mail providers do not share the keywords used to generate the ads shown to the user.  The ad itself could be made sufficiently generic that there would be no reason to expect any foul play.

While I have not tried out any such attack, attempting to execute it would be a worthwhile experiment, and a way of understanding one aspect of electronic privacy and e-mail security.

Anonymous Email Accounts

December 2nd, 2012 by wh3

While I am reading “Security Is Hard, But That Doesn’t Mean You Should Ignore It on techcrunch”, I found a link to an interesting article “Don’t be a Petraeus: A Tutorial on Anonymous Email Accounts”.

A little bit background: David Petraeus is the former CIA Director who resigned after his affair with Paula Broadwell was discovered by the FBI. How did FBI find out about the affair? In short, by looking at their email records. Here’s how the affair was discovered:

“Broadwell and Petraeus used pseudonymous webmail accounts to talk to each other. That was a prudent first step, but it was ineffectual once the government examined Google’s logs to find the IP address that Broadwell was using to log into her pseudonymous account, and then checked to see what other, non-pseudonymous, accounts had been used from the same IP address. Under current US law, much of this information receives inadequate protection, and could be obtained from a webmail provider by the FBI without even requiring a warrant.”

Contrary to what most of us falsely believes, our emails content is not a real secret. Email providers may give up metadata about your messages–the IP addresses you’ve been logging in from, the times you’ve logged into your webmail, and the email addresses of the people with whom you’ve been corresponding. They may even give up the contents of your messages to law enforcement,

Therefore, in order to achieve real anonymous online communication, here’s what the article suggest:

1. Use the Tor Browser Bundle when setting up and accessing your webmail account.You must always use Tor. If you mess up just once and log into the pseudonymous account from your real IP address, chances are that your webmail provider will keep linkable records about you forever.
2. Ensure that you do not give your webmail provider any information that is linked to your real world identity.
3. Set up a new webmail account, ideally with a provider that you do not otherwise use. Use a provider that allow the use of Tor and HTTPS, for instance, HushMail.
4. As an added precaution, you may want to use public wifi at an Internet cafe or a library whenever you connect.
5. Make sure that your messages never contain any information that may give your identity away if you wish to remain anonymous.
6. Encrypt your email correspondence using OpenPGP if you don’t want anyone to have access to your content.

For normal/law-abiding people like we are, it’s unlikely that we will need to protect our emails against the investigation of the government. But it’s always good to know that our emails aren’t actually anonymous. If you ever want to put something that you don’t want anybody else to know, follow the steps above.

Links:
http://techcrunch.com/2012/12/01/security-is-hard-lets-go-shopping/
http://en.wikipedia.org/wiki/Petraeus_scandal
https://www.eff.org/deeplinks/2012/11/tutorial-how-create-anonymous-email-accounts

Japan’s space agency probes possible data leak

December 1st, 2012 by wh3

 Japan’s space agency says it is investigating a possible leak of data about its Epsilon rocket, to be launched next year,  due to a computer virus. The Japan Aerospace Exploration Agency says an infected computer was disconnected from its networks after a virus was found earlier this month. It is checking to see if any data was siphoned from it. The agency said it is tightening security to prevent any further leaks.

It was shocking for me to see that for a project of such high confidentiality and importance, security is done so poorly. Such security exploits are not rare. For instance, Sony was hacked 1 year ago and lost lots of its user data. I think the take-away is that every engineers should have some basic understanding of security in addition to their domain specific expertise. Only in this way, can we build safe applications/services that are robust against attacks.

Security analysis – Remote car key

December 1st, 2012 by wh3

Recently I lost my car key and with it goes my “remote entry” fob. Only then did I realize how inconvenient it is for me to having to plug in the physical key to open the door or the trunk every time. Therefore, I did a bit research online and found that I can purchase a new remote entry unit for only $70 on amazon and “program” it for the car myself(which involve procedures like turning on and off ignition for 3 times in 10 seconds and etc). While this is easy and convenient, I began to question the security of these devices–how hard it is for someone else to hack this device and get into my car?

I then did some research online, here’s how a remote key works in the early days: the transmitter in the key fob sends out signals containing unique identifying code to the car for verification. If the car verifies that the code is correct, it opens the door/starts the engine. As the unique code is fixed, hackers can “capture” the code the transmitter sends and simply re-transmit to open the car.

Modern remote controllers are a lot more complex and robust: They use something called a rolling code(normally 40-bit) to provide security. Both the transmitter and the receiver use the same pseudo-random number generator. When the transmitter sends a 40-bit code, it uses the pseudo-random generator to pick a new code. On the other end, when the receiver receives a valid code, it uses the same pseudo-random generator to pick a new one. In this way, the receiver only opens the door if it receives the code it expects. Capturing the old code will no longer work as the old code is no longer valid.

While some remote key manufacturer claim that attacks to such remote controllers only exists in theory and are hardly practical. The paper “Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars” presented at 2011 Network and Distributed System Security Symposium demonstrated relay attack on such system. Here’s my quick understanding of how the relay attack works: The mechanism for the Passive Keyless Entry System is that the car will periodically send signals to the key. As the signal is very weak, it can only be picked up by the key when the key is very close to the car. The relay attacks works by placing an antenna near the car and the other one near to the key. The antenna picks up the signal the car sends out and relay it to the other antenna that is close to the key, which tricks the system into thinking that the key is within short distance from the car. Here’s a scenario proposed by the paper.

In this Parking Lot scenario, the attackers can install their relay setup in an underground parking, placing one relay antenna close to the passage point (a corridor, a payment machine, an elevator). When the user parks and leaves his car, the Passive Keyless Entry System will lock the car. The user then exits the parking confident that his car is locked (feedback form the car is often provided to the owner with indicator lights or horn). Once the car is out of user’s sight, the attackers can place the second antenna to the door handle. The signals will now be relayed between the passage point and the car. When the car owner passes in front of this second antenna with his key in the pocket, the key will receive the signals from the car and will send the open command to the car. As this message is sent over UHF it will reach the car even if the car is within a hundred meters 10. The car will therefore unlock. Once that the attacker has access to the car, the signals from within the car are relayed and the key will now believe it is inside the car and emit the allow start message. The car can now be started and driven. When the attacker drives away with the car, the relay will no longer be active. The car may detect the missing key; however, for safety reasons, the car will not stop, but continue running. Similarly, the car might detect a missing key for several other reasons including if the key battery is depleted. Some car models will not notify the user if the key is not found when the car is on course, while some will emit a warning beep. None of the evaluated cars stopped the engine if the key was not detected after the engine had been started.

There are two restrictions on this attack: 1) the car antenna must be really close(30 cm) to the car. 2) The key antenna should be within 8 meters from the key.  As we can see from the scenario, these two requirements are not that hard to satisfy. Moreover, all the equipments used in the relay attack can be build under $1000, making it very feasible. The authors test this approach on 10 different cars by different manufacturers and all of them proved to be vulnerable to such attack.

It looks like that the remote car keys are not that safe. The only good news is that none of the police agencies had ever heard of an instance of an automobile theft being accomplished through such high tech techniques. Rather than spending all the trouble to set up the equipments, the thieves prefer to simply smash the windows.

Relevant links:
http://auto.howstuffworks.com/remote-entry.htm
http://www.snopes.com/autos/techno/lockcode.asp
http://eprint.iacr.org/2010/332.pdf

Confirmed: Final exam / presentation time: 8-11am

November 29th, 2012 by dwallach

Yes, it’s early. 8-11am. DH 1075. Wednesday. Be there!

no class Friday / final exam time in flux

November 28th, 2012 by dwallach

Quick notes:
1) there will be no class on Friday.
2) I need to be on a 1pm flight on the day of our final presentations / exam. That means that we’re going to have to reschedule. I’ve requested the same room, only 8-11am. Yes that sucks, but we can all suffer together. I’ll bring munchies. Stay tuned, because the room is not yet confirmed.

Understanding the economy of Online Affiliate Programs key to fight against them

November 28th, 2012 by kb20

A USENIX 2012 security video [1] provides a rare glimpse into how the online affiliate programs work. Understanding their economy may be the key to controlling these programs. In this paper they analyze leaked data from three affiliate programs online which amounts to 185M in gross revenue, 1M+ customers, 1.5M+ purchases, and 2600+ affiliates. First, I will provide brief introduction of online affiliate programs. Next, I will present the findings of the USENIX paper, followed the discussion of ideas on how the government could control or get rid of these programs altogether.

Most of us have come across unsolicited emails advertising different types of drugs. But, what we may all not know is this is a part of a full fledged underground economy which has business that functions much like the normal businesses – they keep track of financial records, revenue, cost etc. First player in this economy is the customer, the receiver of the spam email who may turn around and buy drugs online. Next player, is the affiliate marketer, who sent the spam email to begin with. Once, the customer decides to click on the link, the affiliate marketer is out of the game and the transaction is handled from that point on by the affiliate supplier which has staffs for customer service. The affiliate supplier however relies on another entity for payment processing. In general, these affiliate programs like to retain customers. So, they try to keep them happy by promptly addressing any of their concern.

The customers are usually people who are trying to save money by buying cheaper drugs online. The affiliate marketers are mostly spammers who own botnets. They work purely on commission based on the volume of traffic that they generate to the site.  Some affiliate program apply screening process to recruit best affiliate marketers while others let anybody join as it does not cost the program anything – they work on pure commission. The payment service providers (PSP) charges a fee each time based on the value of the transaction (~10%). The shipping and handling is around 11.5% of the transaction. The cost of actual item is only around 7% percent of the transaction. After, 30% pain in commission to the marketing affiliate and other costs of operating a business, their average actual profit margin is around 16% and 30% in a highly optimistic case.

From the analysis of the data, they found out that 95% of the customers are from US, Canada, Australia and Europe. Erectile dysfunction drugs make 75% of the orders and generate 80% of the revenue. An interesting fact they found out was that between 2010 and 2011, one of the affiliate programs, RX Promotion’s relation with PSP went sour. This resulted in sharp decline in its profit to the point where it was about to close. No payment means they cannot take any new customer nor can they keep the affiliate spammers. Another point to note here is that three PSP processed 84% of the transactions for all three affiliate programs. Next important insight is that 10% of the affiliates accounted for the 80% of the revenue for these affiliate programs. Most affiliates failed with a median revenue  of US$ 350/year. However, the top earners like the operators of Rustock earned US$ 1.9M, and Scorrp2 earned US$3M. The affiliate with the largest revenue, webplanet, earned US$ 4.6M, through web-based advertising.

To, summarize, if we have any hope of fighting these affiliate programs that sell fake or unauthorized drugs online, we have to first cut their life line which is their connection to PSPs. And, since there are only handful of the PSPs that do majority of the processing, it is a cost-effective move. As we saw, a handful of affiliates generate most of the revenue, the most cost effective way curb this industry is to direct operations against these “big player” affiliates.

 

References:

[1] https://www.usenix.org/conference/usenixsecurity12/pharmaleaks-understanding-business-online-pharmaceutical-affiliate

Internet privacy in China

November 28th, 2012 by Yanxin

We all know that China has an internet censorship system. Besides IP blocking and DNS poisoning, it has a very powerful keyword filtering system. All it does is scanning packets and as long as it discovers any sensitive keywords, it sends a reset packets to both end points to kill the connection. I do not think this is only a censorship problem. I think this is also a privacy problem, because your data might be analyzed by other people that you do not know. Here comes the question. Can people in China ensure their internet privacy? Or can you ensure your privacy if your data is sent to China or routed through China? I do not think so. Due to the internet censorship in China, most internet companies have to deploy a censorship system into their internal networks. I think this is the reason why internet privacy cannot be ensured.

The most popular instant messaging software in China nowadays is QQ which is developed by one of the largest Internet company in China named Tencent. Basically most people that have internet access in China has a QQ account. As we might expect, Tencent has its own censorship system, and thus Tencent has its own list of sensitive keywords. Therefore, people might not be able to send curse words to each other and of course people cannot talk about any topic that is considered sensitive by the company or by the government. (In China, government actually has control over local companies) Another most popular tweeter-like website, www.weibo.com , also has this “feature”. The company that hosts Weibo, Sina, also has its own censorship system. Therefore, people cannot post sensitive information.

People’s privacy cannot be ensured because of those censorship systems. Let me tell you a piece of news that I read a few months ago. Two people in China decided to rob a local bank and they discussed the plan using QQ. Then they went to the bank, and before they started several police showed up and arrested them. The question here is, how did those police know about the plan in the first place? Another story is more about politics. As we all know that in 2011 a revolution took place in Egypt. Some people in China heard about it and wanted to protest. Then they discussed their location and time, and when they arrived hundred of police were stand by there. How did the police know there was a protest?

The answer is that basically every province or even every city has a secret special police department that has tens to thousands of people whose job is monitoring network traffic all the time. Oh Lord, that sounds like the people in China are living in a place where thousands of cameras are watching them.

Although the internet privacy is a problem here, the bigger concern I think is whether we can all ensure our internet privacy not just in China. One of my friends who is studying finance once told me that if we lend someone money, even though that person owes us money, one important fact still holds. We are not the ones that have the money and that person more or less has a little advantage over us. I think that internet privacy is similar to that. Once your data is written into other people’s hard drive, the people who owns the hard drive still have advantage over us. Even though laws can punish them if they steal our data, laws still cannot prevent the stealing from happening.

Image Theft via FTP

November 27th, 2012 by Apoorv Agarwal

While reading one of the blogs from the websites mentioned in our reading list, I came across this blog which talks about the case where the malware present in the system was trying to steal the several image files like .jpg and .jpeg. They had also noticed that there was also network transfer of several Windows memory  dumps (.dump) files which is usually created  in the events of crash as to diagnose the cause of crash. The files were stolen and were send on FTP channel. Events like are not new few years back also there has been some events where the hackers intruded into the celebrity machines and had stolen some of his personal files.

Some of the screenshots of what they had witnessed looks like:

In the above figure it actually shows that the FTP server is storing all the files received from the victims machines.

They had witnessed the transaction of .dump files also along with .jpeg/.jpg files and having most files in the category of image format they believe that .dump file is just a typo for .bmp file format. But i am not convinced with this argument as it may happen that even intruder also wants to leave the same impression that its all about the images and docs only.

Their argument that .dump file was just a typo do not convinced me, as usually whenever the dump is created  system data also got archived and in those files information regarding the host machines get stored like Windows registry, firewall configuration. These information when used properly could give complete access to the users machine which is far more asking ransome about  those files stolen from the victims machines.

 

References:

1) http://surf.ml.seikei.ac.jp/~nakano/dump-restore/dump-restore-mini-HOWTO.en.html

2) http://blogs.mcafee.com/mcafee-labs/image-theft-via-ftp-could-be-first-stage-of-attack

3)http://documentation.commvault.com/hds/release_8_0_0/books_online_1/english_us/features/express_recovery/express_recovery.htm