Security and privacy in communication networks 14th international conference securecomm 2018 singapo

Page 1


Visit to download the full and correct content document: https://textbookfull.com/product/security-and-privacy-in-communication-networks-14th -international-conference-securecomm-2018-singapore-singapore-august-8-10-2018proceedings-part-ii-raheem-beyah/

More products digital (pdf, epub, mobi) instant download maybe you interests ...

Security and Privacy in Communication Networks 14th

International Conference SecureComm 2018 Singapore Singapore August 8 10 2018 Proceedings Part I Raheem Beyah

https://textbookfull.com/product/security-and-privacy-incommunication-networks-14th-international-conferencesecurecomm-2018-singapore-singapore-august-8-10-2018-proceedingspart-i-raheem-beyah/

Security and Privacy in Communication Networks 15th EAI

International Conference SecureComm 2019 Orlando FL USA October 23 25 2019 Proceedings Part II Songqing Chen

https://textbookfull.com/product/security-and-privacy-incommunication-networks-15th-eai-international-conferencesecurecomm-2019-orlando-fl-usa-october-23-25-2019-proceedingspart-ii-songqing-chen/

Security and Privacy in Communication Networks 16th EAI

International Conference SecureComm 2020 Washington DC USA October 21 23 2020 Proceedings Part II Noseong Park

https://textbookfull.com/product/security-and-privacy-incommunication-networks-16th-eai-international-conferencesecurecomm-2020-washington-dc-usa-october-21-23-2020-proceedingspart-ii-noseong-park/

Security and Privacy in Communication Networks 12th

International Conference SecureComm 2016 Guangzhou China October 10 12 2016 Proceedings 1st Edition Robert Deng

https://textbookfull.com/product/security-and-privacy-incommunication-networks-12th-international-conferencesecurecomm-2016-guangzhou-chinaoctober-10-12-2016-proceedings-1st-edition-robert-deng/

Cloud Computing and Security 4th International Conference ICCCS 2018 Haikou China June 8 10 2018

Revised Selected Papers Part II Xingming Sun

https://textbookfull.com/product/cloud-computing-andsecurity-4th-international-conference-icccs-2018-haikou-chinajune-8-10-2018-revised-selected-papers-part-ii-xingming-sun/

Security and Privacy in Communication Networks 16th EAI

International Conference SecureComm 2020 Washington DC USA October 21 23 2020 Proceedings Part I Noseong Park

https://textbookfull.com/product/security-and-privacy-incommunication-networks-16th-eai-international-conferencesecurecomm-2020-washington-dc-usa-october-21-23-2020-proceedingspart-i-noseong-park/

International Conference on Security and Privacy in Communication Networks 10th International ICST Conference SecureComm 2014 Beijing China September 24 26 2014 Revised Selected Papers Part II 1st Edition

Jing Tian https://textbookfull.com/product/international-conference-onsecurity-and-privacy-in-communication-networks-10thinternational-icst-conference-securecomm-2014-beijing-chinaseptember-24-26-2014-revised-selected-papers-part-ii-1st-edi/

Cloud Computing and Security 4th International Conference ICCCS 2018 Haikou China June 8 10 2018

Revised Selected Papers Part I Xingming Sun

https://textbookfull.com/product/cloud-computing-andsecurity-4th-international-conference-icccs-2018-haikou-chinajune-8-10-2018-revised-selected-papers-part-i-xingming-sun/

Cloud Computing and Security 4th International Conference ICCCS 2018 Haikou China June 8 10 2018

Revised Selected Papers Part VI Xingming Sun

https://textbookfull.com/product/cloud-computing-andsecurity-4th-international-conference-icccs-2018-haikou-chinajune-8-10-2018-revised-selected-papers-part-vi-xingming-sun/

Raheem Beyah

Bing Chang

Yingjiu Li

Sencun Zhu (Eds.)

Security and Privacy in Communication Networks

14th International Conference, SecureComm 2018 Singapore, Singapore, August 8–10, 2018

Proceedings, Part II

LectureNotesoftheInstitute forComputerSciences,SocialInformatics

andTelecommunicationsEngineering255

EditorialBoard

OzgurAkan

MiddleEastTechnicalUniversity,Ankara,Turkey

PaoloBellavista

UniversityofBologna,Bologna,Italy

JiannongCao

HongKongPolytechnicUniversity,HongKong,HongKong

GeoffreyCoulson

LancasterUniversity,Lancaster,UK

FalkoDressler

UniversityofErlangen,Erlangen,Germany

DomenicoFerrari

Università CattolicaPiacenza,Piacenza,Italy

MarioGerla

UCLA,LosAngeles,USA

HisashiKobayashi

PrincetonUniversity,Princeton,USA

SergioPalazzo

UniversityofCatania,Catania,Italy

SartajSahni

UniversityofFlorida,Florida,USA

XueminShermanShen

UniversityofWaterloo,Waterloo,Canada

MirceaStan

UniversityofVirginia,Charlottesville,USA

JiaXiaohua

CityUniversityofHongKong,Kowloon,HongKong

AlbertY.Zomaya

UniversityofSydney,Sydney,Australia

Moreinformationaboutthisseriesat http://www.springer.com/series/8197

RaheemBeyah • BingChang

SecurityandPrivacy inCommunication Networks

14thInternationalConference,SecureComm2018

Singapore,Singapore,August8–10,2018

Proceedings,PartII

Editors

RaheemBeyah

KlausAdvancedComputingBuilding

GeorgiaInstituteofTechnology

Atlanta,GA,USA

BingChang

SingaporeManagementUniversity

Singapore,Singapore

YingjiuLi

SchoolofInformationSystems

SingaporeManagementUniversity

Singapore,Singapore

SencunZhu

PennsylvaniaStateUniversity UniversityPark,PA,USA

ISSN1867-8211ISSN1867-822X(electronic)

LectureNotesoftheInstituteforComputerSciences,SocialInformatics andTelecommunicationsEngineering

ISBN978-3-030-01703-3ISBN978-3-030-01704-0(eBook) https://doi.org/10.1007/978-3-030-01704-0

LibraryofCongressControlNumber:2018940136

© ICSTInstituteforComputerSciences,SocialInformaticsandTelecommunicationsEngineering2018

Thisworkissubjecttocopyright.AllrightsarereservedbythePublisher,whetherthewholeorpartofthe materialisconcerned,specificallytherightsoftranslation,reprinting,reuseofillustrations,recitation, broadcasting,reproductiononmicrofilmsorinanyotherphysicalway,andtransmissionorinformation storageandretrieval,electronicadaptation,computersoftware,orbysimilarordissimilarmethodologynow knownorhereafterdeveloped.

Theuseofgeneraldescriptivenames,registerednames,trademarks,servicemarks,etc.inthispublication doesnotimply,evenintheabsenceofaspecificstatement,thatsuchnamesareexemptfromtherelevant protectivelawsandregulationsandthereforefreeforgeneraluse.

Thepublisher,theauthorsandtheeditorsaresafetoassumethattheadviceandinformationinthisbookare believedtobetrueandaccurateatthedateofpublication.Neitherthepublishernortheauthorsortheeditors giveawarranty,expressorimplied,withrespecttothematerialcontainedhereinorforanyerrorsor omissionsthatmayhavebeenmade.Thepublisherremainsneutralwithregardtojurisdictionalclaimsin publishedmapsandinstitutionalaffiliations.

ThisSpringerimprintispublishedbytheregisteredcompanySpringerNatureSwitzerlandAG Theregisteredcompanyaddressis:Gewerbestrasse11,6330Cham,Switzerland

Preface

Wearedelightedtointroducetheproceedingsofthe14thEuropeanAlliancefor Innovation(EAI)InternationalConferenceonSecurityandPrivacyinCommunication Networks(SecureComm2018),heldinSingapore,inAugust2018.SecureComm seekshigh-qualityresearchcontributionsintheformofwell-developedpapers.Topics ofinterestencompassresearchadvancesinallareasofsecurecommunicationsand networking.

ThetechnicalprogramofSecureComm2018consistedof33fullpapersand18short papersinthemainconferencesessions.Theconferencesessionswere:Session1,IoT Security;Session2,UserandDataPrivacy;Session3,MobileSecurityI;Session4, WirelessSecurity;Session5,SoftwareSecurity;Session6,CloudSecurityI;Session7, MobileSecurityII;Session8,SocialNetworkandEnterpriseSecurity;Session9, NetworkSecurityI;Session10,AppliedCryptography;Session11,NetworkSecurity II;Session12,CloudSecurityII;andSession13,WebSecurity.

Asidefromthehigh-qualitytechnicalpaperpresentations,thetechnicalprogram alsofeaturedtwokeynotespeechesandonetechnicalworkshop.Thetwokeynote speechesweregivenbyProf.RobertDengfromSingaporeManagementUniversity, Singapore,andProf.ZhiqiangLinfromOhioStateUniversity,USA.Theworkshop organizedwasthe6thInternationalWorkshoponApplicationsandTechniquesin CyberSecurity(ATCS2018).TheATCSworkshopfocusedonallaspectsoftechniquesandapplicationsincybersecurityresearch.ThepurposeofATCS2018wasto provideaforumforthepresentationanddiscussionofinnovativeideas,cutting-edge researchresults,andnoveltechniques,methods,andapplicationsonallaspectsof cybersecurityandmachinelearning.

CoordinationwiththeSteeringCommitteeco-chairs,ImrichChlamtacandGuofei Gu,wasessentialforthesuccessoftheconference.Wesincerelyappreciatetheir constantsupportandguidance.Itwasalsoagreatpleasuretoworkwithsuchan excellentOrganizingCommitteeteamfortheirhardworkinorganizingandsupporting theconference.Inparticular,wethanktheTechnicalProgramCommittee,ledbyour co-chairs,Dr.RaheemBeyahandDr.SencunZhu,whocompletedthepeer-review processoftechnicalpapersandcompiledahigh-qualitytechnicalprogram.Wearealso gratefultotheconferencecoordinator,DominikaBelisova,forhersupportandallthe authorswhosubmittedtheirpaperstotheSecureComm2018conferenceand workshops.

WestronglybelievethattheSecureCommconferenceprovidesagoodforumforall researchers,developers,andpractitionerstoexchangeideasinallareasofsecure communicationsandnetworking.WealsoexpectthatfutureSecureCommconferences willbesuccessfulandstimulating,asindicatedbythecontributionspresentedinthis volume.

BingChang

YingjiuLi

SencunZhu

Organization

SteeringCommitteeCo-chairs

ImrichChlamtacUniversityofTrento,Italy GuofeiGuTexasA&MUniversity,USA

SteeringCommitteeMembers

KrishnaMoorthy Sivalingam IITMadras,India

PengLiuPennsylvaniaStateUniversity,USA

OrganizingCommittee

GeneralChair

YingjiuLiSingaporeManagementUniversity,Singapore

TechnicalProgramCommitteeCo-chairs

RaheemBeyahGeorgiaTech,USA

SencunZhuPennsylvaniaStateUniversity,USA

PublicationsChair

BingChangSingaporeManagementUniversity,Singapore

PublicityandSocialMediaCo-chairs

YangguangTianSingaporeManagementUniversity,Singapore ZhaoWangPekingUniversity,China SankardasRoyBowlingGreenStateUniversity,USA

WebChair

XimingLiuSingaporeManagementUniversity,Singapore

PanelsChair

MinSukKangNationalUniversityofSingapore,Singapore

LocalChair

LiTieyanShieldLab(Singapore),HuaweiTechnologiesCo., Ltd.,Singapore

ConferenceManager

DominikaBelisovaEAI-EuropeanAllianceforInnovation

TechnicalProgramCommittee

ElisaBertinoPurdueUniversity,USA

AlvaroCardenasTheUniversityofTexasatDallas,USA

KaiChenInstituteofInformationEngineering,ChineseAcademy ofSciences,China

YuChenStateUniversityofNewYork – Binghamton,USA

ShermanS.M.ChowTheChineseUniversityofHongKong,SARChina JunDaiCaliforniaStateUniversity,Sacramento,USA MohanDhawanIBMResearch,India

BirhanuEsheteUniversityofIllinoisatChicago,USA

DebinGaoSingaporeManagementUniversity,Singapore LeGuanPennsylvaniaStateUniversity,USA YongGuanIowaStateUniversity,USA YongzhongHeBeijingJiaotongUniversity,China LinHuangQihoo360TechnologyCo.Ltd.,China

HeqingHuangIBMResearch,USA ShoulingJiZhejiangUniversity,China

YierJinUniversityofFlorida,USA

IssaKhalilQatarComputingResearchInstitute(QCRI),Qatar LeeLernerGeorgiaInstituteofTechnology,USA MingLiUniversityofArizona,USA

QinghuaLiUniversityofArkansas,USA QiLiTsinghuaUniversity,China XiaojingLiaoCollegeofWilliamandMary,USA Yue-HsunLinJD.com,USA

ZhiqiangLinTheOhioStateUniversity,USA YaoLiuUniversityofSouthFlorida,USA AnyiLiuOaklandUniversity,USA GiovanniLivragaUniversità degliStudidiMilano,Italy

JavierLopezUniversityofMalaga,Spain RongxingLuUniversityofNewBrunswick,Canada LiranMaTexasChristianUniversity,USA AzizMohaisenUniversityofCentralFlorida,USA

GoutamPaulIndianStatisticalInstitute,India RuiQiaoLinkedIn,USA

SankardasRoyBowlingGreenStateUniversity,USA PierangelaSamaratiUniversità degliStudidiMilano,Italy

SeungwonShinKAIST,SouthKorea

KapilSinghIBMResearch,USA

AnnaSquicciariniPennsylvaniaStateUniversity,USA MartinStrohmeierUniversityofOxford,UK

KunSunGeorgeMasonUniversity,USA A.SelcukUluagacFloridaInternationalUniversity,USA

ZhiguoWanShandongUniversity,China CongWangCityUniversityofHongKong,SARChina WeiWangBeijingJiaotongUniversity,China LanierWatkinsJohnsHopkinsUniversity,USA

EdgarWeipplSBAResearch,Austria DinghaoWuPennsylvaniaStateUniversity,USA JidongXiaoBoiseStateUniversity,USA KaiqiXiongUniversityofSouthFlorida,USA ZhiXuPaloAltoNetworks,USA ShouhuaiXuUniversityofTexasatSanAntonio,USA YiYangFontbonneUniversity,USA DanfengYaoVirginiaTech,USA

KaiZengGeorgeMasonUniversity,USA

ChaoZhangTsinghuaUniversity,China FengweiZhangWayneStateUniversity,USA YuqingZhangUniversityofChineseAcademyofSciences,China

JunjieZhangWrightStateUniversity,USA WenshengZhangIowaStateUniversity,USA YongjunZhaoTheChineseUniversityofHongKong,SARChina YunleiZhaoFudanUniversity,China CliffZouUniversityofCentralFlorida,USA

Contents – PartII

SocialNetworkandEnterpriseSecurity

AMobileBotnetThatMeetsUpatTwitter........................3 YulongDong,JunDai,andXiaoyanSun

DetectingSuspiciousMembersinanOnlineEmotionalSupportService....22 YuLi,DaeWookKim,JunjieZhang,andDerekDoran

TowardsaReliableandAccountableCyberSupplyChaininEnergy DeliverySystemUsingBlockchain..............................43 XuepingLiang,SachinShetty,DeepakTosh,YafeiJi,andDanyiLi

SocialBotDetectionUsingTweetsSimilarity.......................63 YahanWang,ChunhuaWu,KangfengZheng,andXiujuanWang

NetworkSecurity

AMulti-protocolAuthenticationShibbolethFrameworkand ImplementationforIdentityFederation............................81 MengyiLi,Chi-HungChi,ChenDing,RaymondWong,andZhongShe

SDN-AssistedNetwork-BasedMitigationofSlowDDoSAttacks.........102 ThomasLukaseder,LisaMaile,BenjaminErb,andFrankKargl

AHolisticApproachTowardsPeer-to-PeerSecurityandWhyProof ofWorkWon’tDo.........................................122 BerndPrünster,DominikZiegler,ChrisitanKollmann,andBojanSuzic

ARobustIntrusionDetectionNetworkUsingThresholdlessTrust ManagementSystemwithIncentiveDesign........................139 AmirRezapourandWen-GueyTzeng

AMetapolicyFrameworkforEnhancingDomainExpressiveness ontheInternet............................................155 GauravVarshneyandPawelSzalachowski

AdaptiveDeterrenceofDNSCachePoisoning......................171 SzeYiuChau,OmarChowdhury,VictorGonsalves,HuangyiGe, WeiningYang,SoniaFahmy,andNinghuiLi

Mission-OrientedSecurityModel,IncorporatingSecurityRisk, CostandPayout...........................................192

SayedM.SaghaianN.E.,TomLaPorta,TrentJaeger,Z.BerkayCelik, andPatrickMcDaniel

OntheFeasibilityofFine-GrainedTLSSecurityConfigurations inWebBrowsersBasedontheRequestedDomainName..............213 EmanSalemAlashwaliandKasperRasmussen

AppliedCryptography

NeuralNetworkBasedMin-entropyEstimationforRandomNumber Generators...............................................231

JingYang,ShuangyiZhu,TianyuChen,YuanMa,NaLv, andJingqiangLin

ImprovedQuantumKeyDistributionNetworksBasedonBlom-Scheme....251 Ya-QiSongandLiYang

ImplementationofHighThroughputXTS-SM4ModuleforDataStorage Devices.................................................271

LiangZheng,ChangtingLi,ZongbinLiu,LingchenZhang, andCunqingMa

DetectingandDefendingAgainstCertificateAttackswithOrigin-Bound CAPTCHAs..............................................291

AdilAhmad,FaizanAhmad,LeiWei,VinodYegneswaran, andFareedZaffar

WebSecurity

FrameHanger :EvaluatingandClassifyingIframeInjection atLargeScale.............................................311

KeTian,ZhouLi,KevinD.Bowers,andDanfeng(Daphne)Yao

Xilara:AnXSSFilterBasedonHTMLTemplateRestoration...........332

KeitaroYamazaki,DaisukeKotani,andYasuoOkabe

LocalStorageonSteroids:AbusingWebBrowsersforHiddenContent StorageandDistribution......................................352

JuanD.ParraRodriguezandJoachimPosegga XIIContents – PartII

AReviewandCostingofLightweightAuthenticationSchemesforInternet ofThings(IoT): TowardsDesignofanAuthenticationArchitecture forSmartHomeApplications ..................................375 AttleeM.Gamundani,AmeliaPhillips,andHippolyteN.Muyingi

ASurveyofBigDataSecuritySolutionsinHealthcare................391 MusfiraSiddique,MuhammadAyzedMirza,MudassarAhmad, JunaidChaudhry,andRafiqulIslam

MalwareDetectionforHealthcareDataSecurity.....................407 MozammelChowdhury,SharminJahan,RafiqulIslam,andJunbinGao

SecureCommunicationonNoCBasedMPSoC......................417 GauravSharma,SoultanaEllinidou,VeronikaKuchta, RajeevAnandSahu,OlivierMarkowitch,andJean-MichelDricot

OnlineRadicalisationAlongaContinuum:FromWhenIndividualsExpress GrievancestoWhenTheyTransitionintoExtremism.................429 YeslamAl-Saggaf

AMultipleLinearRegressionBasedHigh-PerformanceErrorPrediction MethodforReversibleDataHiding..............................441 BinMa,XiaoyuWang,BingLi,andYunqingShi

ASecureAODVProtocolImprovementSchemeBasedonFuzzy NeuralNetwork...........................................453 TongyiXie,JiaweiMo,andBaohuaHuang

What’sinaDowngrade?ATaxonomyofDowngradeAttacks intheTLSProtocolandApplicationProtocolsUsingTLS..............468 EmanSalemAlashwaliandKasperRasmussen

AnApproachtoEnhanceUnderstandingofDigitalForensicsTechnical TermsinthePresentationPhaseofaDigitalInvestigationUsing MultimediaPresentations.....................................488

NikenDwiWahyuCahyani,BenMartini,Kim-KwangRaymondChoo, andHelenAshman

EventReconstructionofIndonesianE-BankingServicesonWindows PhoneDevices............................................507

NikenDwiWahyuCahyani,BenMartini,Kim-KwangRaymondChoo, andHelenAshman

AuthorIndex ............................................523

Contents – PartI

IoTSecurity

ASecureRemoteMonitoringFrameworkSupportingEfficient Fine-GrainedAccessControlandDataProcessinginIoT...............3 YaxingChen,WenhaiSun,NingZhang,QinghuaZheng, WenjingLou,andY.ThomasHou

SecuringtheSmartHomeviaaTwo-ModeSecurityFramework..........22 DevkishenSisodia,SamuelMergendahl,JunLi,andHasanCam

OutofKilter:HolisticExploitationofDenialofServiceinInternet ofThings................................................43 SuhasSetikere,VinaySachidananda,andYuvalElovici

AugmentedChainofOwnership:ConfiguringIoTDeviceswiththeHelp oftheBlockchain..........................................53 SophieDramé-Maigné,MarylineLaurent,LaurentCastillo, andHervé Ganem

UserandDataPrivacy

SecureandEfficientMulti-PartyDirectoryPublication forPrivacy-PreservingDataSharing.............................71 KatchaguyAreekijseree,YuzheTang,JuChen,ShuangWang, ArunIyengar,andBalajiPalanisamy

AFormalLogicFrameworkfortheAutomationoftheRight toBeForgotten............................................95 AbhishekTiwari,FabianBendun,andChristianHammer

Privacy-PreservingBiometric-BasedRemoteUserAuthentication withLeakageResilience......................................112 YangguangTian,YingjiuLi,RongmaoChen,NanLi,XimengLiu, BingChang,andXingjieYu

DifferentiallyPrivateHigh-DimensionalDataPublication viaMarkovNetwork........................................133 FengqiongWei,WeiZhang,YunfangChen,andJingwenZhao

MobileSecurity

AutomatedIdentificationofSensitiveDataviaFlexibleUserRequirements...151 ZiqiYangandZhenkaiLiang

UnderstandingAndroidObfuscationTechniques:ALarge-Scale InvestigationintheWild.....................................172

ShuaikeDong,MenghaoLi,WenruiDiao,XiangyuLiu,JianLiu, ZhouLi,FenghaoXu,KaiChen,XiaoFengWang,andKehuanZhang

TransparentLow-LatencyNetworkAnonymisationforMobileDevices.....193

MartinByrenheid,StefanKöpsell,AlexanderNaumenko, andThorstenStrufe

InferringUIStatesofMobileApplicationsThroughPowerSide ChannelExploitation........................................210

YaoGuo,JunmingMa,WenjunWu,andXiangqunChen

PoliteCamera:RespectingStrangers’ PrivacyinMobilePhotographing.....227 AngLi,WeiDu,andQinghuaLi

LexicalMiningofMaliciousURLsforClassifyingAndroidMalware......248 ShanshanWang,QibenYan,ZhenxiangChen,LinWang, RiccardoSpolaor,BoYang,andMauroConti

GranDroid:Graph-BasedDetectionofMaliciousNetworkBehaviors inAndroidApplications......................................264

ZhiqiangLi,JunSun,QibenYan,WitawasSrisa-an, andShakthiBachala

FGFDect:AFine-GrainedFeaturesClassificationModelforAndroid MalwareDetection.........................................281

ChaoLiu,JiananLi,MinYu,BoLuo,SongLi,KaiChen, WeiqingHuang,andBinLv

WirelessSecurity

AnAdaptivePrimaryUserEmulationAttackDetectionMechanism forCognitiveRadioNetworks.................................297

QiDong,YuChen,XiaohuaLi,KaiZeng,andRogerZimmermann

VeReMi:ADatasetforComparableEvaluationofMisbehaviorDetection inVANETs..............................................318

RensW.vanderHeijden,ThomasLukaseder,andFrankKargl

BirdsofaFeatherFlockTogether:FuzzyExtractorandGait-BasedRobust GroupSecretKeyGenerationforSmartWearables...................338 ChitraJavaliandGirishRevadigar

UnchainedIdentities:PuttingaPriceonSybilNodesinMobile AdHocNetworks..........................................358 ArneBochem,BenjaminLeiding,andDieterHogrefe

SoftwareSecurity

UnderstandingtheHiddenCostofSoftwareVulnerabilities:Measurements andPredictions............................................377 AfsahAnwar,AminollahKhormali,DaeHunNyang,andAzizMohaisen

Privacy-EnhancedFraudDetectionwithBloomFilters.................396 DanielArp,ErwinQuiring,TammoKrueger,StanimirDragiev, andKonradRieck

FriSM:MaliciousExploitKitDetectionviaFeature-Based String-SimilarityMatching....................................416 SungjinKimandBrentByungHoonKang

AMachineLearningFrameworkforStudyingDomainGeneration Algorithm(DGA)-BasedMalware...............................433 TommyChin,KaiqiXiong,ChengbinHu,andYiLi

CloudSecurity

Se-Lambda:SecuringPrivacy-SensitiveServerlessApplications UsingSGXEnclave........................................451 WeizhongQiang,ZezhaoDong,andHaiJin

CAVAS:NeutralizingApplicationandContainerSecurityVulnerabilities intheCloudNativeEra......................................471 KennedyA.Torkura,MuhammadI.H.Sukmana,FengCheng, andChristophMeinel

Shuffler:MitigateCross-VMSide-ChannelAttacks viaHypervisorScheduling....................................491 LiLiu,AnWang,WanYuZang,MengYu,MenbaiXiao, andSongqingChen

BuildingYourPrivateCloudStorageonPublicCloudService UsingEmbeddedGPUs......................................512 WangzhaoCheng,FangyuZheng,WuqiongPan,JingqiangLin, HuorongLi,andBingyuLi

SecureandEfficientOutsourcingofLarge-ScaleOverdeterminedSystems ofLinearEquations.........................................529 ShiranPan,Wen-TaoZhu,QiongxiaoWang,andBingChang

Privacy-PreservingMultipartyLearningforLogisticRegression..........549 WeiDu,AngLi,andQinghuaLi

Privacy-PreservingOutsourcingofLarge-ScaleNonlinearProgramming totheCloud..............................................569 AngLi,WeiDu,andQinghuaLi

AVerifiableandDynamicMulti-keywordRankedSearchScheme overEncryptedCloudDatawithAccuracyImprovement...............588 QiZhang,ShaojingFu,NanJia,andMingXu

AuthorIndex ............................................605

AMobileBotnetThatMeetsUp atTwitter

YulongDong,JunDai(B) ,andXiaoyanSun

CaliforniaStateUniversity,Sacramento,6000JStreet,Sacramento,CA95819,USA {dong,jun.dai,xiaoyan.sun}@csus.edu

Abstract. Nowadaysonlinesocialnetworkingisbecomingoneofthe optionsforbotnetcommandandcontrol(C&C)communication,and QRcodeshavebeenwidelyusedintheareaofsoftwareautomation.In thispaper,weorchestrateQRcodes,Twitter,Tornetwork,anddomain generationalgorithmtobuildanewgenerationofbotnetwithhighrecoverycapabilityandstealthiness.Unlikethetraditionalcentralizedbotnet, ourdesignachievesdynamicC&Ccommunicationchannelswithnosinglepointoffailure.Inourdesign,nocryptographickeyishard-coded onbots.Instead,weexploitdomaingenerationalgorithmtoproduce dynamicsymmetrickeysandQRcodesasmediumtotransportdynamic asymmetrickeys.Byusingthisapproach,botnetC&Ccommunication payloadcanbeensuredintermsofrandomizationandconfidentiality.We implementourdesignviaTwitterandreal-worldTornetwork.According totheexperimentresults,ourdesigniscapabletodoC&CcommunicationwithlowdataandminimalCPUusage.Thegoalofourworkisto drawdefenders’attentionforthecyberabuseofonlinesocialnetworking andTornetwork;especially,thesearchingfeatureinonlinesocialnetworksprovidesacovertmeet-upchannel,andneedstobeinvestigated assoonaspossible.Finally,wediscussseveralpotentialcountermeasures todefeatourbotnetdesign.

Keywords: Mobilebotnet · Onlinesocialnetworking · QRcode

1Introduction

Withthefastdevelopmentofmobileindustryandtechnology,thenumberof mobileusershasdramaticallyincreased.Asthemostpopularopen-sourcemobile platformintheworld,over2billionmonthlyAndroiddeviceswerefoundactive byMay,2017[1].Toturnthehugenumberofmobiledevicesintoanarmyto performattackslikeDistributedDenialofService(DDoS),SMSinterception, andspamming,attackersstartedtobuildmobilebotnets[2, 3].

Twocommoncommandandcontrol(C&C)topologiesarefoundintraditionalPC-basedbotnets:centralizedandPeer-to-Peer(P2P)-basedstructures. Incentralizedbotnets,theC&Ccommunicationlatencyisshortandthebotmastercanmonitorthenumberofavailablebotsusingsingleorlimitedamount

c ICSTInstituteforComputerSciences,SocialInformaticsandTelecommunicationsEngineering2018 R.Beyahetal.(Eds.):SecureComm2018,LNICST255,pp.3–21,2018. https://doi.org/10.1007/978-3-030-01704-0 1

ofC&Cservers[4].However,centralizedbotnetssufferfromsinglepointoffailure,i.e.thebotnetcanbeeasilydisabledbythedefendersviashuttingdownthe C&Cchannels.Moreover,thebotmasterisdirectlyexposedtodefenderswhen theC&Cchannelismonitored.

Ontheotherhand,P2P-basedbotnetshavenosinglepointoffailureand achievebetterstealthinessforthebotmaster.However,P2P-basedbotnetssuffer fromtheloosenessofnetworkstructure,lackmessagetransmissionguarantee, andtendtohavelongerlatencyformessagedelivery[4–6].Also,P2P-based botnetsrequirehighernetworkoverheadtokeepthebotnetsrobust[7, 8].

ComparedwithtraditionalPC-basedbotnets,mobilebotnetsareinherently restrictedbythefeaturesofmobileplatforms:lowCPUcapacity,smallnetwork bandwidth,limitedbatteryandexpensivedatausage.Giventheabovecomparativestudyaboutbotnettopology,acentralizedbotnetdesignismoredesirable forthemobileenvironment.However,thedrawbacksofcentralizeddesignneed tobeaddressedforrobustnessandstealthiness,especiallythesinglepointof failureproblem.

OurpaperisanefforttosolvetheseissuesbyexploitingtheautomationfeatureinQRcodesandtheTwittersearchenginetobuilddynamicC&Cchannels withhighrecoveryabilities.Thefollowingparagraphsintroducethetechniques thatareessentialforoursolution,aswellasrationalestoexploitthem.

QuickResponse(QR)code :QRcodeshavebeenwidelyusedinmobilesoftware automationinthepastfewyears.Comparedwithtraditionalmasqueradingtechniques,QRcodesaremorestealthysinceithasbeenwidelyusedindailylife forotherpurposesandcannotbedistinguishedbyhumanbeings.Researchers [9–11]reportthatQRcodeshavebeenusedinseveralattackingmethodssuchas phishingandsocialengineeringattacks.However,theautomaticdetectionand removalofmaliciousQRcodesforsecurityisstillafairlynewtopicinthearea.

OnlineSocialNetworking(OSN) :Asoneofthemostpopularpublicnetworking services,OSNdrawsattentionfromresearchers[12–14]touseitforbuildingC&C channels.ComparedwithotherbotnetC&Ccommunicationmediums,OSNhas severaladvantages,suchasthesimplicityinimplementation,theportability overmulti-platformenvironments,andthestealthiness.Nowadays,someOSN platformslikeTwitterandSinaBlog(apopularChineseOSNplatform)provide searchinginterfacetoallowuserstofindinterestedpostsbykeywords.Wefind thatthesearchfeatureprovidesapossibilitytobuilddynamicC&Cchannels insteadofstatic(i.e.hard-coded)ones.ThedynamicC&Cchannelscanhelp avoidsinglepointoffailure,andthusdeliverbetterrobustnessandhighrecovery capabilities.

DomainGenerationAlgorithm(DGA) :DGAfromConficker[15]in2008isa solutiontoavoidsinglepointoffailureinthecentralizedtopology.Ingeneral, DGAtakesoneormultipleseedsasinputstoproducerandomdomainnames. Basedontheactualimplementation,DGAmayhugelyincreasethedifficulty ofpredictingthenextgenerateddomainname,andmakeitcomputationally impossibletostoptheattackthroughbanningallpossibleDGAoutputs[16].In

ourbotnetdesign,wevaryDGAtoproducerandomstringsinsteadofdomain names.TheDGAgenerationresultsplayascountersigns(leftbythebotmaster) tohelpbotsfindthemeetupplaceatTwitter.

Tornetwork :Internetwasbornasapublicnetwork,whilethesecondgenerationonionrouter(Tor)[17]provisionsanidealtechniquetoachieveanonymity. Torwasinventedwithready-to-useclientproxyandwebbrowser.Itisnatural tothinkofTornetworktokeepbotmaster’sC&Ccommunicationanonymous. Today,Torhasbeenintegratedwiththemobileplatform,suchasOrbot[18] forAndroid.WiththeappearanceofOrbot,theimplementationcomplexityof Tor-basednetworkapplicationsonAndroidisdramaticallydecreased,andthe botmastercaneasilyusemobileAndroiddevicestoissuecommandstobotnet withfairstealthiness.

BycreativelyorchestratingQRcodes,OSN,DGAandTornetwork,our botnetdesignsuccessfullyenablesthefollowingfeaturestoovercomethenatural limitationintraditionalcentralizedandP2P-basedbotnets.

• ConstructinganewOSN-basedmobilebotnetwithnosinglepointoffailure.

• BuildingdynamicC&Cchannelswithhighrecoverycapabilitybasedonthe TwittersearchengineandQRcodes.

• UsingdynamicasymmetrickeypairsandDGAwithrandomseedstokeep theconfidentialityofC&Ccommunicationtraffic.

• UsingTornetworktohidetheidentityofbotmaster.

• SimpleimplementationandhugepotentialthreatstoallOSNsthatinclude searchingfeatures.

OurdesignisgenericforbothmobileandPCplatforms,whileourproof ofconceptandcorrespondinganalysisisconductedonAndroidplatform. To thebestofourknowledge,wearethefirsttouseQRcodesasC&C communicationmediuminOSN-basedbotnet

Therestofthepaperisconstructedasfollows:inSect. 2,weintroducethe relatedwork.InSect. 3,weelaborateourbotnetdesign.InSect. 4,wepresentthe proofofconcept,includingawalkthroughtodemonstrateourbotnetworkflow. InSect. 5,weevaluateourwork.InSect. 6,wediscusspotentialcountermeasures toourbotnetdesign.InSect. 7,weconcludethispaper.Moredesignrationales andimplementationdetailsarepresentedin[19],andtheprototypecodecanbe provideduponrequestforresearchpurposes.

2RelatedWork

ResearchershaveproposedavarietyofapproachestobuildbotnetsonbothPC andmobileplatforms,eitherintraditionalcentralizedorP2P-basedtopologies. WeintroducerelatedbotnetresearchanddesignsinSect. 2.1,andsummarize ourliteraturereviewinTable 1.TherelatedQRcoderesearchisintroducedin Sect. 2.2.

Table1. Listofrelatedbotnetresearch&Designs

Research Year Platform Botnettopology C&Cchannel Masqueradetechnique

Huaetal.[20] 2011 Mobile P2P SMS N/A

Zengetal.[21] 2012 Mobile P2P SMS Plainencryptedtext

Faghanietal.[22] 2012 Mobile Centralized SMS/OSNs N/A

Nagarajaetal.[23] 2011 PC Centralized OSNs Steganography(JPEG)

Cuietal.[12] 2011 PC Centralized OSNs Steganography(JPG)

Singhetal.[13] 2013 PC Centralized OSNs N/A

Yinetal.[14] 2014 PC Centralized OSNs PlainencryptedText

Compagnoetal.[24] 2015 PC Centralized OSNs Unicodestenography

Koobface[25–27] 2010 PC Centralized OSNs/webserver Plainencryptedtext

Elirks[28] 2012 PC Centralized OSNs Plainencryptedtext

2.1BotnetResearchandDesign

SinceShortMessageService(SMS)isacommontechnologyinmobileenvironments,severalresearcheshaveaddressedSMSasC&Cchannelinbotnetdesign. In2011,Huaetal.[20]builtabotnetwithSMSandfloodingalgorithm.Hua’s designsuccessfullyspreadsonecommandto90%of20,000botsin20minwith eachbotsendinglessthan4messages.However,Hua’sdesignsuffersfromthe naturallimitationoffloodingalgorithm,i.e.ifdefendersshutdownabotthat isveryclosetothefirstone,thebotmasterlosestherestofbotsintheflood.

In2012,Zengetal.[21]proposedaSMSandP2P-basedbotnetdesign.Their researchconcludesthattheubiquitousnessofSMS,thesimplicityofaccommodatingofflinebots,andthecapabilityofhidingC&CcommandsmakeSMS suitableforC&Ccommunicationsinmobileenvironment.Howeverthemalicioustextmessagesintheirbotnetdesignisdirectlyexposedtophoneowners, andthemonetarycostofSMSmayattracttheowners’attentionevenwithout anti-malwarealerts.

Ontheotherhand,Faghanietal.[22]designedSocellbotwhichcompares SMSandOSNsascommunicationmediuminmobileenvironment.Basedon theirexperimentresults,OSNsexcelinlowernetworktrafficloadandfaster propagationspeed,andhencearemoresuitableformobileenvironmentthan SMS.

Nagarajaetal.[23]introducedabotnetdesignbycombiningsteganographyandOSNs.InNagarajia’sresearch,alltheC&Ccommunicationcommands arehiddeninJPEGimages.Thebotmasterandbotsusetwohard-codedOSN accountsasC&Cchannels.InNagaraja’sdesign,theC&Ctrafficisstealthy,but thebotnetsuffersfromsinglepointoffailure.Ifthehard-codedOSNaccounts aredetectedandbannedbydefenders,thebotmasterlosescontrolofthewhole botnet.

SimilartoNagaraja’sidea,Cuietal.[12]designedanOSN-basedbotnet calledAndbot.AndbotcombinesURL-flux(avariationofIP-flux),steganography,andMicrosoftblogtodecreasethethreatofsinglepointoffailureand increasethestealthinessofC&Ccommunication.Intheirdesign,theblogworks

asaC&Cchannel.Botsuseahard-codedDGAalgorithmtoassembleanURLto findtheblogbuiltbythebotmaster.Aftertheblogisconnected,botsdownload steganographicimagestoreceivethebotmaster’scommands.

FollowingupwithCui’sresearch,Yinetal.[14]reportedanewergeneration ofbotnetdesigncombiningSinablogandNicknameGenerationAlgorithm(a variationofDGA)tobuilddynamicC&Cchannels.InYin’sdesign,thebotnet hasnosinglepointoffailureandhighresistancetodestruction.However,thereis stillabottleneckthatthenetworkloadcapacityofeachC&Cchannelislimited. Inalargegroupofbots,botmasterneedstobuildmultipleC&Cchannelsinorder toallowallthebotstoretrievethecommands.Also,theidentityofbotmaster isdirectlyexposedtotheblogwebsitewithoutanyprotection.

Singhetal.[13]appliedTwitterastheC&Ccommunicationplatformfora centralizedbotnet.Intheirdesign,theytakeadvantageoftheOAuthmechanismprovidedbyTwittertoensuretheoriginofC&Ccommands.Thebotmaster postsC&CcommandsthroughitsTwitteraccount.Thedrawbackofthisdesign isthatitsuffersfromsinglepointoffailure.Ontheotherhand,alistofcommandsarehard-codedoneachbotwhichmaybepronetothedetectionofany anti-virussystems.

Inadditiontoimagestenography,Compagnoetal.[24]foundandproved Unicodeencodingcanbeusedasamasqueradingtechnique.Intheirresearch, thebotmastertakesadvantageofUnicodeandhidestheC&Ccommunication usinginvisibleUnicodecharacters.Compagno’sbotnetdesignisabletosurvive fromthetraditionalbotnetdetectionanddefensestrategies,butmaybecaptured bycharacterfilteringandstatisticalanalysisontheOSNposts.

Besidetheabovebotnetdesignsfromresearch,OSNsarealreadypractically observedinreal-worldmalware.Forexample,in2010Koobfacewasdetected andinvestigatedbyresearchers[25–27].Asanetworkworm,OSNsareused byKoobfacetodownloaddifferentpiecesofmaliciouscontent,anddoC&C communicationthroughseveralhard-codedOSNaccountsandwebservers.The specificOSNaccountscanbebanned,whichcausesKoobfacesufferfromsingle pointoffailure.

Researchers[28]alsocapturedandinvestigatedwildbotnetswiththeirC&C communicationmethods.AnOSN-basedbotnetcalledElirikswasdetectedbased ontheirobservation.InEliriks,thebotmasterpoststheinformationoftheC&C webserveronamicrobloggingservicecalledPlurk.FortheC&Cserver’sinformation,thebotmasterusesamodifiedTinyEncryptionAlgorithm(TEA)and modifiedBase-64encodingtofurthermasqueradetheC&Cserver’ssensitive information.ThedefenderswereabletosuccessfullyextractthePlurkaccounts usedbyElriksbythetimethatthecorrespondingpaperwaspublished.Inother words,Eliriksdidnotsurvivefromthethreatofsinglepointoffailure.

2.2QRCodeResearch

In2010,Kiesebergetal.[10]didasecurityresearchonQRcodes.Basedontheir research,theautomationfeatureinQRcodesisvulnerabletoSQLinjection, commandinjection,fraud,phishing,andsocialengineeringattacks.Krombholz

etal.[9]listsseveralexperimentalexamplestoprovethatthethreatsfrom Kiesebergcanactuallybeimplementedinreal-worldenvironment.

Ontheotherhand,Kharrazetal.[11]investigated94,770QRcodesfrom 14.7millionuniquewebpagesin2014.Intheirreport,theyfound145real-world maliciousQRcodeswereusedinphishingandmalwaredistribution.

AlthoughthereisalreadyproofoftheexistenceofmaliciousQRcodes,the researchaboutQRcodesecurityisstillfallingbehind.Yaoetal.[29]didasecurityinvestigationon31commercialQRcodescanners.Basedontheirevaluation, onlytwoofthemincludesecuritywarningsafterusersscanaQRcode.Thisis duetolackofresearchonthedetectionofsuspiciousQRcodes.

Ourbotnetdesignhasfourfundamentaladvantagesincontrastwiththe aboverelatedwork.First,comparedwithotherOSN-basedbotnets,ourbotnetdesignleveragestheOSNsearchingfeaturetofurtherrandomizethelocationsthattheC&Caccountappears.Theoretically,thebotmastercoulduseany accountinOSNstopublishtheC&Ccommands.Second,beyondothermasqueradingtechniques,weuseQRcodestodisguisethebotnetC&Cpoststo ensuretheirstealthiness.Third,insteadofhard-codedkeys,weusedynamic symmetricandasymmetrickeystoensuretheconfidentialityofbotnetC&C communication.Fourth,Tornetworkissuccessfullyintegratedinourbotnet designtohidetheidentityofbotmaster.

3Methodology

WeexploittheTwittersearchengine,DGA,andQRcodestoensurethebotnetrobustnessandstealthiness.Specifically,weleverageTor,RSA[30],and AdvancedEncryptionStandard(AES)[31]cryptographicalgorithmrespectively toachieveanonymity,integrity,andconfidentialityforthebotnetC&Ccommunication.

Nomatterhowthebotnettopologiesevolve,pushing,pulling,andlistening arethecommonoptionsforbotstodoC&Ccommunications.Inthissection,we firstgiveaoverviewofourbotnetdesign.Afterthat,fourmajorpartsofourbotnetdesignareintroducedinthefollowingsubsections:initialization,command pulling,informationcollection,andcommandpushing.

Inthispaper,theterminologiesaredenotedasfollows:theDGAisdenoted as DGA(),theDGAseedsas Seed1 , Seed2 ,...to Seedn ,thegeneratedresults fromDGAas S1 , S2 ,...to Sn ,theRSAkeypairas Keypub and Keypriv ,and aspecialtokenas Token.TheDGAalgorithmishard-codedonbots,withthe DGAseedsderivedfromtimestamps,forsynchronizationwiththebotmaster. Thespecialtokenisarandomstringconcatenated(withadelimiter)withits digitalsignaturesignedbythebotmaster,i.e.encryptedby Keypriv .Thetoken ishard-codedonallbotsforauthenticationpurpose.NoRSAkeypairsare hard-coded.

3.1BotnetDesignOverview

AsshowninFig. 1,ourbotnetdesigninvolvesfivemajorparts:botmaster,Tor network,Twitter,bots,andamovablewebserverbuiltbybotmaster.Thebotmaster’sdutyistosetupthewebserver,prepareandpublishTwitterposts,and sendcommandstobots.Twitter’sroleistoholdaTwitterpostasatemporary C&CchannelthatallowsbotstopullaQRcodeimagefromthebotmaster.The Twitterpostcontainstwomajorsections:akeywordgeneratedfromDGAanda QRcodeimage.Thewebserverissetupbythebotmastertocollectinformation fromeachbot,suchasIPaddressanddeviceID.TheIPofthewebserveris propagatedtobotsaspartoftheQRcode,andthuscouldbedynamic.The combinationofthewebserverandTwitterpostsworksasC&Cchannelswhich allowbotstodocommandpullingandinformationuploading.Inaddition,every botsetsupaTCPserveronitsowndevice.Throughinformationuploading,bots encryptanduploadtheiridentify-sensitiveinformationtothewebserver.When thebotmasterwantstosendcommandstobots,itdownloadsanddecryptsthe botuploadeddatafromthewebserver,andthensendscommandstobotsvia Tornetwork.

Inourbotnetdesign,onlytheDGAalgorithmandaspecialtokenarehardcodedonbothbotmasterandbotsides.Thecurrentdate(i.e.timestamp)is usedasakeyfactortoproduceexactlythesameDGAseedsonbothbotmaster andbotsides.Basedontheactualimplementation,DGAcantakeanyformat ofseedsthatisgeneratedbythecurrentdate.AllbotnetC&Ccommunication isencryptedbyAESorRSA,andnokeyishard-codedonbots.Thesymmetric keysusedbyAESaregeneratedfromDGA,andthepublickeyusedbyRSA isspreadaspartoftheQRcodefrombotmaster’sTwitterpost.Thespecial tokenisusedtoverifytheidentityofbotmasterandvalidatethedatasource afterdecryption.

ThecommunicationbetweenthebotmasterandoutsidenetworksisviaTor. AsFig. 1 illustrates,therearefivestepsinourbotnetdesign.Step 1 servesasthe initializationprocessforthebotmastertoprepareandpublishtheTwitterpost. Step 2 isusedbybotstodownloaddatafromthebotmaster’sTwitterpost. Then,botsuploadtheirIPanddeviceinformationtothewebserverinStep 3

10Y.Dongetal.

ThebotmasterdownloadsbotdatafromthewebserverinStep 4 ,andusesthe downloadeddatatosendcommandstobotsviaTornetworkinStep 5 .Inour design,usingTCPasthecommunicationprotocolinStep 5 hastwoadvantages. First,itisareliablecommunicationprotocolwhichguaranteesmessagedelivery. Second,itmakesthedesigncompatiblewithTornetwork,whichonlysupports TCPorHTTPcommunication.

AwalkthroughispresentedinSect. 4 todemonstratetheabovebotnetworkflow.

3.2C&CCommunication

Initialization. ThebotmasterneedstoperformafewinitializationproceduresbeforetheC&Ccommunicationstarts.First,thebotmastersetsupa webserver.Second,thebotmastergeneratestworandomstrings S1 and S2 from DGA(Seed1 )and DGA(Seed2 ).After S1 and S2 aregenerated,thebotmastercollectsthewebserver’saddressinformation,aswellasapre-generated RSAkeypair Keypub and Keypriv .Third,botmastercombinesthecurrentweb serveraddress,thehard-codedtoken Token,and Keypub asacommand,and thenencryptsthecombinedcommandwith S2 .Fourth,thebotmasterencodes thecombinedcommandintoaQRcodeimage.Finally,thebotmasterusesa randomTwitteraccounttopublishapost,whichcontains S1 andtheQRcode image.

CommandPulling. Botsregularlyconductscommandpulling,andsucceed wheneverthebotmaster’sTwitterpostisavailable.First,similartothebotmaster,botsgeneratetwostrings S3 and S4 from DGA(Seed3 ),and DGA(Seed4 ). Inourdesign,inordertoensurethesynchronizationbetweenthebotsandbotmaster, S3 mustbeequalto S1 and S4 mustbeequalto S2 .Thisisensuredby applyingthesamealgorithmstotimestampsforgettingequivalentseedsatboth botandbotmastersides,andthenusingthesameseedsforDGAalgorithms. Botsuse S3 asthe keywordtoquerytheTwittersearchengine tofind thepostfromthebotmaster.BotsdownloadtheQRcodeimagebasedonthe queryresponse.AftertheQRcodeimageisdownloaded,botsfirstdecodethe QRcodetoretrieverawdataanduse S4 tododecryption.Thebotmaster’s publickey Keypub andthespecial Token arecontainedinthedecrypteddata, andthebotscanuse Keypub toverifywhether Token isgeneratedbythereal botmasterusingthepaired Keypriv

InformationCollection. Thewebserverisimportanttomaintaintherobustnessofthebotnet,asallbotsareinstructedtouploadtheirrealIPanddevice IDtothewebserverafterIPspoofing.IPspoofinghelpsdisguisethebotidentitiesduringC&Ccommunications,incasetheyaretrackeddown.Inorderto keeptheiruploadeddatasafe,alldatafrombotsareencryptedby Keypub ,and remainscipheredindatabasestorageatthewebserver.Thisway,thebotmaster canmonitorandgettheinformationofavailablebotsinthebotnetviatheweb serversafely.

CommandPushing. Thebotmastercansendcommandstobotsatanytime. Forcommandpushing,allavailablebotshavetheircurrentIPaddressesstored onthewebserver.Whencommandpushingisneeded,thebotmasterfirstgenerated S5 from DGA(Seed5 ).Then,thebotmastercombinesthecommandfor botsand Token asonestring,andencryptsthecombinedstringwith S5 .The botmasterqueriesthewebservertocollecteachbot’sIPaddressanddecrypt theresultusing Keypriv .Afterthat,thebotmasterextractstheIPaddresses ofbotsandbroadcaststheencryptedcommandviaTCP-basedTornetwork. AfterTCPpackagesarereceived,botsgenerate S6 from DGA(Seed6 ).Similar toStep 1 and 2 , Seed6 isset(viasynchronizedtimestamps)equalto Seed5 toensurethebotscandecrypttheTCPpayload.Aftercheckingtheexistence of Token forvalidityofthecommandoriginasbotmasterornot,botsperform tasksincludedinthecommand.

Throughouttheabovecommunications, onlytheDGAalgorithmand thespecialtokenarehard-coded onbothbotmasterandbotsides.The rationaleforhard-codingthespecialtokenwillbeelaboratedinSect. 3.3.The variousseedsforDGAaresynchronizedbetweenthebotmasterandbotsby applyingthesamecomputingalgorithmstowardsthedate/timestampinformation.Toavoidsinglepointoffailure,our Twitterpostaccountandtheweb serveraredynamic.EachtimethebotmasterpublishesanewTwitterpost, theQRcodecontainstheinformationtoredirectbotstothenewaddressofthe webserver.IftheTwitterpostisbannedbydefenders,thebotmastercanpublishanotherpostfromadifferentandunpredictableaccount.Ifthewebserveris banned,thebotmastersetsitupinanewaddressandgeneratesanewQRcode imagewhichcontainsthenewserveraddress.Thus,nomatterhowdefenders destroytheC&Cchannels,thebotmasteralwayshasawaytoreconstructthe botnet.

3.3CryptographyandBotnetRobustness

Aswementionedearilier,alltheC&Ccommunicationinourbotnetdesignis encryptedeitherbyAESorRSA.Step 1 , 2 and 5 areprotectedbyAES.Step 3 and 4 areprotectedbyRSA.It’sfullyunderstoodthatRSArequiresmore resourcesthanAESforcomputing.However,AESwillrequirehardcodingof symmetrickeysforStep 3 and 4 ,whileRSAcanavoidthis.Takinganextreme example,whenabotfallsintoahoneynet,defendersmayeasilytrackdownthe webserveraddressoncethebotisdetected.Ifdefendersfurthermanagetoget alltheencrypteddatafromthewebserveranddecipherthemwithcryptanalysis,otherbotsinthesamebotnetmaygettheirIPaddressesanddeviceIDs directlyexposedtodefenders.UsingtheRSAastheencryptionalgorithmcan dramaticallydecreasetheriskofsuchsituation.

Inadditiontostrengtheningthedataencryptionincommunicationandstorage,usingtheRSAalgorithmhelpsthebotsauthenticatetheconnectionsand commandsfromthebotmaster.Forexample,ifthedefensesidesucceedsin reverseengineeringthebotsamplesandobtainingthehard-codedtokenwith botnetworkflowinformation,thebotmasteridentitymaybefakedtohijack

theownershipofthebotnet.Thiscanbedefeatedbyusingtheasymmetric encryption,i.e.theRSAalgorithm.Specifically,thespecial Token includesthe digitalsignaturegeneratedbyusingthe Keypriv ,whichisonlyownedbythe realbotmaster.Hence,onlytherealbotmastercouldinitiatetheauthenticC&C communication,asnobodyelsecouldprovidethecorresponding Keypub toverify thesignaturesassociatedwithin Token.It’spossiblethatthereverseengineer defendersuseanintercepted Keypub tofakeasabotmastertoissueabogusweb serveraddresstobots.Butagain,thankstoRSAalgorithmusedinStep 3 to encryptalluploaddata,thefakedbotmasterwillnotbeabletodecipherthe botconnectioninformationforfurtheractions.Defenderscouldnottrackdown thebotaddressesaswell,asStep 3 enforcesbotstouploaddatabasedonIP spoofing.Decipheringtheuploadeddataonthewebserveristheonlychanceto pushcommandstobots,andonlytheauthenticbotmastercanachievethat.

4ProofofConcept

Tofurtherillustrateourbotnetdesign,inthissectionwepresentaquick walk-throughwithessentialimplementationdetailsofourbotnetprototype. TodemonstrateourbotnetdesigninSect. 3,weuseandrun10Genymotion emulatorsonourworkstation,oneGoogleNexus6phone,theTornetwork, onerandomlygeneratedTwitteraccount,oneapacheserver,andoneMySQL databaseinanorchestratedway.Inourdemonstration,eachemulatoractsas oneinfectedbotandtheNexusphoneactsasthebotmaster.

Inordertoemulateanattack,webuildavictimwebsitetoletbotstoperform DDoSattackafterStep 5 .AsFig. 2 shows,aftereachbotprocessesallthe stepsforcommandpulling,informationcollection,andcommandpushing,the botmasterpushesacommandtobotstocoordinatethemtoconductaDDoS attackagainstavictimwebserver.TheTCPpayloadinStep 5 containsan encryptedcommandwhichincludestheinformationof Token,thelengthofthe attack,thefrequencyoftheattack,andtheIPaddressofthevictimwebsite.We presentsomecommandconstructiondetailsinSect. 4.2.Inourdemonstration, thebotmaster’swebserverforinformationcollectionandthevictimwebsiteare bothrunningbasedonapache.TheemulatorsinFig. 2 areperformingaDDoS attacktothevictimwebsite.Afullvideodemonstrationisavailableat[33].

4.1BotnetWorkflow

Initialization. Inourbotnetimplementation,weconfigurethebotmasterto processtheinitializationondailybase.Allthebotmaster’scommunications withthepublicnetwork(i.e.thecommunicationswithTwitterandInternet) arethroughTornetwork.Inourexperiments,thebotmastergeneratesnewQR codesandDGAstringseverysingleday.Dependingonthebotmaster’schoice, itcanalsobehourlyormonthlytoupdatetheQRcodesandTwitterthem accordingly.NomatterhowoftentheTwitterpostsarepublished,thecurrent timestampisusedasakeyfactorforDGAsynchronizationacrossthebotsand

botmaster.Wheneverneeded,thebotmastercanchoosetorenewtheaddressof thewebserverandletthebotsknowthechangethroughanewQRcodeTwitter post.Thebotmasteralsohastheoptiontochoosewhethertouseastandard oramodifiedQRcodeencodinganddecodinglibrary.AftertheQRcodeand DGAstringsareready,asFig. 3 illustrates,thebotmastercouldpostthemwith any(unpredictable)Twitteraccount.Inourexperiments,theTwitterpoststays publicuntilthenextoneispublishedbybotmaster.TheTwitteraccountsused toposttheQRcodecanvaryeveryday.

Fig.2. DemonstrationofbotnetDDoSattack
Fig.3. PublishingaTwitterpost

Another random document with no related content on Scribd:

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.