Syssec Red Book PDF
Syssec Red Book PDF
THE
RED BOOK
A Roadmap for Systems Security Research
NETWORK OF EXCELLENCE
Grant Agreement No. 257007
The research leading to these results has received funding from the European Union
Seventh Framework Programme (FP7/2007-2013) under Grant Agreement Number
257007. This work would not have been possible without the contributions of
the SysSec Working Groups, the SysSec Advisory Board, and the broader SysSec
community in general. We deeply thank them all.
www.syssec-project.eu
SYSSEC TASK FORCE for the ROADMAP
on SYSTEMS SECURITY RESEARCH
CO-CHAIRS
MEMBERS
CONTRIBUTORS
Experienced Researchers may want to focus on the first part of the book,
which provides an in-depth treatment of various research problems and
in Chapter 14 in page 103, which describes Grand Challenge Research
Problems in the area.
Journalists may want to focus on sections *.2 and *.3 of the first part, which
paint a picture of the average and worst-case consequences of the emerg-
ing threats studied.
All should read Chapter 2 in page 7, which lists the identified threats, assets
and security domains.
Contents
1 Executive Summary 3
2 Introduction 7
4 Software Vulnerabilities 27
5 Social Networks 35
9 Legacy Systems 67
10 Usable Security 73
12 Malware 87
16 Forward 109
18 EffectsPlus 117
20 Horizon2020 123
A Methodologies 157
2
1 Executive Summary
B ket of marijuana, heroin, and cocaine combined [13]. Its size was
recently estimated to exceed one trillion dollars [243]. It adversely af-
fected more then 88% of Europeans last year [53]. What is it? It is the Global
Market of Cyber Crime. As we embraced the convenience and effectiveness of
the Internet into our lives, homes, retirement plans, and even wallets, we also
opened the door to a new breed of attackers determined to gain profit from
this wonderful new cyberworld. Motivated by fun, profit, and even political
motives, cyberattackers have now impacted, or threaten to impact, most realms
of our lives.
Understanding the dangers we have subjected ourselves to and predicting
the threats that are going to materialize, is one of the major tasks of the SysSec
Network of Excellence. A four-year project, SysSec has mobilized the top
cybersecurity researchers in Europe and challenged them to think ahead, think
disruptively, and finally predict what should be the important emerging research
areas in cyber security and privacy. This book summarizes the Emerging Threats
identified during the third year of the project and proposes Grand Challenges
that, if addressed, will significantly boost the safety and security of the Internet
for the years to come.
Malware
Targeted Attacks
Mobile Devices
Social Networks
Critical Infrastructures
Give Users Control Over Their Data: Provide the necessary mecha-
nisms so that users
1. will be able to know which data they have created (such as text, photos,
videos, cookies, web requests, etc.),
2. will be able to know what data they have given to third parties (such as
text, photos, cookies, web requests, IP addresses, etc.)
3. will have the capability to refuse disclosure of some data (such as
cookies and IP addresses) and still expect a decent level of service,
4
1.2. Grand Challenges
4. will have the capability to delete their own data which they have created
(both from the local storage as well as from the cloud), and
5. will, under an appropriate legal framework, have the ability to ask
past recipients of their data to erase them as well.
5
2 Introduction
Assets. Assets are resources that entities (such as people and organiza-
tions) hold on to and value. Assets may include money, data, human
rights, etc. Cyberspace may impact the same assets as the physical world,
but probably in entirely new ways. For example, although privacy has
been an asset in the physical world for several years, in cyberspace it
may take on a whole new spin, as (i) the data gathered, (ii) the entities
gathering such data, and (iii) the potential uses of such gathered data are
of unprecedented scale.
One may choose to approach the problem of security and privacy from
any of the above first dimensions. For example, one might start with a threat,
such as a buffer overflow, and explain the types of attacks that can be made
possible, the types of assets that can be compromised, and the kind of domains
in which such attacks would materialize. As another example, one might start
with the assets that seem important and explain how the different domains
may set the stage for an attack on these assets and how an attacker may exploit
domain-specific vulnerabilities or use threats to materialize such attacks.
We feel, however, that in the recent history of cybersecurity and privacy
all above dimensions have been used, so that each individual problem is
described from the most convenient and easiest-to-understand dimension. In
this work we follow a similar approach and categorize the important aspects
of cybersecurity and privacy along these dimensions, so that we are able to
illustrate the concepts from the best point of view.
Malware has been traditionally used as the main vehicle to carry mali-
cious activities for several decades now. Initially materialized as com-
puter viruses and originally spread through floppy disks, malware is
still going strong, compromising computers at the speed of the Internet.
8
2.2. Mapping the Threats We Fear
Sheet1
targeted attacks
malware
APTs
software vulnerabilities
web vulnerabilities
insider threats
9
2. Introduction
10
2.3. Listing the Assets We Value
Sheet1
identity
privacy
health
anonymity
democracy/sovereignty
2nd
reputation
1st
IPR
Life. The dearest of all an individuals assets, life may be the target
Page 1
of cyberattackers. Indeed, attacks on medical systems, transportation
systems, or systems dealing with emergency response may easily lead to
massive loss of life.
order to understand how the general setting impacts this new Right.
11
2. Introduction
future, where each and every action people take on-line will probably be
recorded in some database beyond their control.
Identity. Although our identity in the physical world is well defined, and
hardly needs to be proven during the course of a normal day, especially
in small-scale environments, such as villages and towns, our identity in
the cyberspace is almost entirely based on digital credentials (such as
passwords), which can be lost, stolen, sold, and abused much like any
piece of information. This opens the door to a wide variety of attacks
that can lead to identity theft.
12
2.4. Understanding the Domains of the Game
Sheet1
critical infrastructures
mobile devices
social networks
smart environments
untrained users
the cloud
embedded systems
e-commerce 3rd
2nd
legacy systems
1st
implantable devices
challenges.
On-line Games. On-line games and virtual worlds present at least two
interesting opportunities for cyberattackers: (i) users spend a lot of their
time playing games, and (ii) rewards awarded in on-line games can be
monetized in the real word.
13
2. Introduction
Mobile Systems. The widespread use of mobile phones and the recent
emergence of location-aware smart-phones has given rise to new inter-
esting attacks on the security and privacy of users. Compromising a
mobile phone is no longer about dialing a few high-premium numbers
and charging the user extra roaming costs. It is about eaves-dropping
on all the users conversations; it is about following each and every
footstep of the user; it is about having access to the most personal aspects
of the users lives.
Wireless Networks. It has been said that children born in 2012 will
not understand why we need wires to communicate. This is so true.
Most of our communications today are wireless giving attackers the
opportunity to jam them, to intercept them, to monitor them and (why
not?) to modify them.
14
2.5. Horizontal Research Directions
15
2. Introduction
cover our energy needs? Or: What if antibiotics do not work anymore? How will
we be able to fight infections and diseases? Or: What if climate change results in
an average sea level rise of two meters in the next few years? How will this impact
our lives? In this spirit we set out to define a few ambitious questions in the
area of security and privacy; questions that will make people think creatively;
questions that will create a disruptive approach to security and an open mind
to change.
What if the Internet shuts downs for a day or two? Let us assume that
sometime in the future the entire Internet shuts down for a day or two.
Let us assume that all communications that are made possible by the
Internet will just not be there anymore. How would this impact our lives?
What kinds of activities will just not be possible? Furthermore, assume a
16
2.6. What If?
world where the threat of this outage is being taken for real by people
and organizations, much like the threat of an earthquake or the threat of
a tsunami. What impact would such a threat have on our well-being and
in our financial lives?
What would you like to happen to your data when you pass away?
Assume a world where people keep lots, if not all, of their activities
on-line. Assume that most of their photographs are on-line, most of
their correspondence is on-line, most of their videos are on-line. Summer
holiday pictures, falling-in-love letters, the first-day at school video, the
picture of the tooth given to the tooth-fairy; all are on-line. To survive
the occasional disk crash and the inevitable hardware upgrade, people
would probably store their data in large-scale data centers, currently
going by the name the cloud. What options would we like to give
people with respect to their data collection when they pass away? Will
people be able to delete it? Will they be able to leave it as an inheritance
to their children, much like they leave their family photo albums today?
Will they be able to donate it to humankind, possibly for research? What
security and privacy challenges would such a world create?
17
Part I: Threats Identified
3 In Search of Lost Anonymity
D place over the Internet, a larger percentage of our actions are recorded
every day somewhere on-line. Indeed, most of the news articles that
we browse, most of the books we read, most of the videos we watch, and most
of the things we purchase are recorded somewhere on-line. To make matters
worse, even the activities that do not take place on the Internet are recorded on-line.
For example, with the increasing penetration of smart-phones, most of the
places we visit, most of the foods we eat, and most of the people we see are
recorded on-line. Sophisticated artificial intelligence algorithms can usually
infer the most personal details of our life: where we are, where we sleep, who
we are in love with.
Take for example, the recently
The cyberspace is an unforgiving
announced case where a major re-
medium: it has a lot of capacity to re-
tail store managed to find out that
member, but has no capability to forget.
a teenage girl was pregnant before
her parents knew [28]. As surreal
as it might seem, the same retail store managed to perfect its algorithms to
the level where it is able to know that women are pregnant even before they know it
themselves [27]. It is not hard to imagine that using algorithms based on artifi-
cial intelligence and correlating such findings with smartphone location-based
data, such retail stores or data aggregators will soon be able to correctly guess
the name of the father of the child as well!
22
3.4. State of the Art
Do we build a zoo, put our children in a cage, and invite everyone to watch?
Is this the healthy environment we are preparing for the next generation?
23
3. In Search of Lost Anonymity
3.5.1 Prevention
Prevent information from being given away. Make sure that web sites and
applications operate with the minimum information required. Demonstrate
technologies that perform the required functionality with the minimum infor-
mation possible. Develop anonymized versions of oneself. Develop systems,
such as browsers, that transparently supply the appropriately anonymized
version with the minimum possible information. For example, do not give a
users full ID to a web site that just needs to verify the visitors age.
3.5.2 Monitoring
24
3.6. Example problems
3.5.3 Deletion
Develop approaches to (selectively) delete ones data. As a simplest case,
consider the right to be forgotten [330]. Advance research on how (or if) this can
be technically implemented. Focus on how to selectively delete only aspects of
ones profile.
3.5.4 Anonymization
Develop mechanisms to anonymize and share data in anonymized form. Then,
data collectors and aggregators would be required to process data only in
anonymized or encrypted forms.
25
4 Software Vulnerabilities
Porous Defenses
28
4.1. What Is the Problem?
29
4. Software Vulnerabilities
30
4.5. State of the Art
parts of critical infrastructures, such as power grids and traffic control systems,
perhaps causing severe damage and potentially mass casualties. Threats
against critical infrastructures are further discussed in Chapter 6.
Smaller-scale hostile acts could also be facilitated by the prevalence of
software-controlled devices and equipment. Implantable medical devices [206]
and cars [123] are two prominent examples.
31
4. Software Vulnerabilities
cations [91, 106, 342]. Also, many academic efforts aim at applying security
concepts from operating systems to the web platform [198, 332, 369, 389, 390].
32
4.7. Example Problems
tem mitigations, exploitable memory errors are still being found even in
the latest versions of widely used applications. The rise of mobile operat-
ing systems such as iOS and Android, in which third-party applications
run with lower privileges, has also made kernel-level memory corruption
vulnerabilities more relevant than everan area that has received less
attention compared to user-level applications because of the different
threat model that usually applies on personal computers compared to
mobile devices.
33
5 Social Networks
F most people tend to think about online social networks such as Facebook,
Google+, and Twitter. As the popularity and use of such online social
networks has increased, the attackers have also started considering how to use
them for nefarious activities. They have become new platforms for conducting
malicious activities and desirable targets for launching attacks.
However, such online social networks are just a subset of all the social
networks that actually exist. Any set of people and their internal social rela-
tionships, representing their interaction, collaboration, or other sort of influence
between them, can be modeled as a general social network. These relationships
are formed by exchanging emails, making phone calls, co-authoring a scientific
article, or a range of other normal activities that will build up a network.
Such information is now collected and organized to gain insights into peoples
lives, but this is also a venue that attackers will use. They can either attack
the properties of the network by, for example, introducing false nodes, or gain
enough information to attack the individual users.
The explosive growth rate of social networks has created the first digital
generation, consisting of people of all ages and backgrounds. People are
creating their digital counterparts for interacting with other users, for both
recreational and professional reasons, and may disclose a vast amount of
personal data in an attempt to utilize these new services to the fullest. As
the social network is a representation of social interaction, it also indirectly
shows the trust between different individuals. However, the lack of technical
literacy among the majority of users has resulted in a naive approach where
the caution demonstrated in the social interactions of the physical world has
disappeared. Users are vulnerable to a series of dangers, ranging from identity
theft to monetary loss, and lack the critical approach that develops over time
and is passed on through generations. As users tend to show a great amount
of trust to online communication and interactions, adversaries aim to sneak
into a victims circle of trust through impersonation. As people trust their
friends, the cyber criminal can then perform a range of attacks that may not be
possible, or effective, as a stranger.
5. Social Networks
5.2.1 Privacy
Users of online social networks tend to share private information, such as
education, occupation, relationship status, current location, and personal habits.
In the wrong hands, this information can be used to launch sophisticated and
targeted attacks against people. Even for individuals who are not users of
online social networks, information about their social interactions can still be
inferred from public data, such as co-authorship information from DBLP [14].
The problems caused by breaching privacy are described in more detail in
Chapter 3.
5.2.2 Spam
Today, email is not any more the only means for
spreading spam, as spammers now use multiple
content-sharing platforms, such as online social
networks, to increase their success rate. The infor-
mation provided by users in their profiles, such
as education, profession, and relationship status,
together with their real email address, provides
spammers with a great opportunity to personalize
their marketing activities and improve the efficiency
of the spam campaigns. Moreover, if a spam email
contains personal information, such as the name
of the receiver, content-based spam detection tools
assign lower spam rates to it and it may therefore
36
5.2. What Is Expected to Happen?
5.2.4 Authentication
In order to mitigate attacks from compromised accounts, mechanisms requiring
more than a password have been introduced, such as Social Authentication
(SA) in Facebook [173]. These types of mechanism require a user to provide
two distinct pieces of evidence in order to be authenticated. For example, in SA,
users must provide a password and recognize pictures randomly chosen from
their friends pictures. Unfortunately, this type of authentication is vulnerable
to advances in face recognition techniques [104, 318]. Different approaches to
authentication and authorization, as well as general problems that exist are
covered in Chapter 7.
37
5. Social Networks
by such an application are then beyond the control of the social network site.
Although online social networks such as Facebook have introduced coarse-
grained access-control mechanisms for third-party applications, there is a need
for more fine-grained mechanisms [163].
Third-party websites can also use the social plu-
gins provided by social network sites such as Face-
book [174] in order to personalize their content, al-
low users to write feedback for their sites, share
the page content with their friends in the social net-
works, or even be authenticated by a social login
plugin. Unfortunately, these plugins also allow third-party websites to access
private user data, and allow the social network sites to track user activities
outside their platform [239].
38
5.5. Research Gaps
39
5. Social Networks
How can we collectively study the information collected from different sources
in real time? There is a need for an engine for organizing real-time stream-
ing data gathered from a variety of social sensing platforms, including
social networks [388]. How can we effectively parallelize and distribute
the data stream processing and introduce methods for identifying cyber
criminals based on the aggregated data?
How can we utilize data mining techniques for discriminating between honest
and malicious identities? The well-studied techniques for graph mining
can be deployed as a tool for combating cyber criminals. Although the
structural properties of social graphs have already been used against
Sybil attacks and spam, much more can be done.
40
6 Critical Infrastructure Security
G tures (CI) refer to systems or assets that are vital in modern society and
economy. Water supply, electricity, transportation, financial services,
health care and telecommunication are the most common examples of CIs. CIs
are regulated by different rules and laws, and operated diversely from country
to country. In addition, CIs are influenced by non-technological factors such as
politics or culture. According to the EU Directive 2008/114/EC [63], a CI is
an asset [...] which is essential for the maintenance of vital societal
functions, health, safety, security, economic or social well-being of
people, and the disruption or destruction of which would have a
significant impact [...] as a result of the failure to maintain those
functions.
Thanks to the evolution of information and telecommunication technology,
controlling CIs remotely (e.g., over the Internet) is feasible and, more impor-
tantly, convenient. Therefore, CI actors (e.g., industries and governments)
have been progressively incorporating IT systems to consolidate the operation
of CIs, up to the point that CIs and IT systems have converged. The term
cyber-physical system (CPS) is commonly used in this context to refer to the
integration of a physical (critical) system with a cyber (Internet-connected)
system, which is typically an industrial control system (ICS). In the remainder
of this section, we will use the term CI to refer to the critical infrastructure as a
part of the physical environment, and the term CPS to refer to the systems that
comprise and interconnect these infrastructures, thus including IT components
(i.e., the ICSs).
Security issues arise because two previously isolated worlds, the Internet
and the CI systems, are now interconnected. When early CIs were created, nei-
ther security nor misuse of the interconnected control system were considered.
As a matter of fact, Internet technology is itself an underlying, critical asset
of modern CIs, because the ICSs that control them are often distributed (over
remote, Internet-connected locations).
This section highlights the most relevant security problems and the state of
the art of CPSs, with a particular emphasis on the ICS part.
6. Critical Infrastructure Security
42
6.2. Who Is Going to Be Affected?
43
6. Critical Infrastructure Security
be needed, something that is not even supported by most SCADA systems and
their backbones.
Subsequent milestones were Duqu (2011) and Flame (2012), both designed
with intelligence gathering purposes, although Flame is more opportunistic as
it spreads also to mobile devices and uses ambient sensors (e.g., microphone)
to steal information. These are two examples of the second most important
application of cyber weapons: espionage. Due to the similarity of some code
fragments of Duqu, Flame and the variants of Stuxnet, it is not unrealistic to
conclude that Duqu was designed to be the precursor of the next Stuxnet [127],
to gather intelligence about CI targets.
Whether Flame will be the precursor of the often predicted year of cyber
attacks (2013), remains to be seen. As mentioned in Section 6.7, recent
industrial research efforts are moving toward this direction by deploying
honeypot ICSs to collect object evidence of attacks, which would be of help in
answering these questions.
44
6.5. State of the Art
45
6. Critical Infrastructure Security
at http://scadahacker.blogspot.com.
46
6.6. Research Gaps
and authenticity. The meters that they examined broadcast their energy usage
data over insecure networks every 30 seconds, although these broadcasts
should only be received when the utility company performs their legitimate
reads. The authors showed that this issue allows monitoring of energy usage
from hundreds of homes in a neighborhood with modest technical effort,
and demonstrated how these data allow the identification of unoccupied
residences or peoples routines. The authors conclude by recommending
security remedies, including a solution based on defensive jamming that can
be deployed more easily than upgrading the meters themselves. A more
interesting defensive mechanism is proposed in [407]. The key concept is to
use battery-based load hiding, where a battery is inserted as a power supply
buffer between the (insecure) smart meter and home devices at strategic times,
in order to hide appliance loads from smart meters. Although this approach
has been proposed in the past, the authors demonstrated that it is susceptible to
attacks that recover precise load change information. Their proposed approach
differs fundamentally from previous work because it maximizes the error
between the load demanded by a home and the external load seen by a smart
meter, thus rendering precise load change recovery attacks difficult. Along a
similar line, in [240] the authors propose a battery-recharging algorithm that
renders the meter reading probabilistically independent of the actual power
usage. In addition, the approach relies on stochastic dynamic programming to
charges and discharges the battery in the optimal way to maximize savings in
the energy cost.
With modern automated smart-meter reading and billing systems, electric-
ity theft is also an issue that costs billions of dollars per year in many countries.
In [270] the authors propose the first threat model for detecting electricity theft,
and a learning-based statistical technique that combines this threat model
with an outlier-detection algorithm to detect unexpected usage profiles. They
evaluated their approach using real metering data and showed that electricity
thieves indeed exhibit a recognizable profile.
Recently, smart meter security has also been tackled from an anomaly
detection point of view. In [327] the authors studied a smart meter technology
equipped with a trusted platform for the storage and communication of
metering data. Despite these security features, the authors acknowledge the
need for an embedded real-time anomaly detector that protects both the cyber
and physical domains [383] from data manipulation, smart meter recalibration,
reset and sleep attacks.
47
6. Critical Infrastructure Security
search areas. Moreover, the high complexity and the high deployment costs of
CPSs make scientific research very expensive, with a high access barrier. For in-
stance, conducting experiments on security protection tools for power-grid ICSs
in real-world conditions may be impossible. In contrast, obtaining samples of
advanced malware families for experiments in the wild is straightforward. This,
however, is changing, as some simulation platforms [191, 192, 290, 326, 359]or,
better, testbeds [31, 35, 36]are being built by governments agencies (also in
Europe [412]) to support research and (military) training. The main research
targets that arise are to determine how accurately these systems can simulate
the true operations of CIs and, more importantly, to test countermeasures
under realistic conditions.
The causes of the threats against CIs are unknown or very uncertain.
Apart from the many speculations, there is no strong evidence to confirm
that attackers are nation states, secret services or actual cybercriminals with
malicious purposes. The cause of this is twofold. Real-world attacks against
CIs found the organization unprepared; thus, few or no data were collected
that could be used to reconstruct the scenario. Even where data are available,
attacks such as Stuxnet are extremely complex, such that they would require
data collected from a multitude of (distributed) sources and actors. Clearly,
this was not possible. This lack of data impacts the research community,
which is left with malware samples, many guesses, and little strong evidence.
This raises the research question regarding how to collect and disseminate
such data through scientific repositories such as those proposed by previous
consortia [62].
48
6.7. Example Problems
Evaluating the accuracy of current modeling and simulation tools and, possibly,
design better simulation tools. There are plenty of SCADA/ICS/CI sim-
ulation tools, created to fill the gap that many researchers face when
they need real devices to test their security mechanisms. It is unclear,
however, how accurate these systems are and how much they adhere to
the reality. Each study in this field has obviously justified the proposed
approach. What is missing is a systematization effort, toward the creation
of a framework that can be used to evaluate existing and future simula-
tors. This framework will have to take into account the characteristics
of real-world attacks: How well is a simulation tool able to emulate the
behavior of a real-world attack such as Stuxnet?
49
7 Authentication and Authorization
52
7.2. Who Is Going to Be Affected?
53
7. Authentication and Authorization
In the space of one hour, my entire digital life was destroyed. First
my Google account was taken over, then deleted. Next my Twitter
account was compromised, and used as a platform to broadcast
racist and homophobic messages. And worst of all, my AppleID
account was broken into, and my hackers used it to remotely erase
all of the data on my iPhone, iPad, and MacBook.
54
7.5. State of the Art
Finally, identity theft can lead to serious incrimination, since today a users
social profile and all activities connected with it can be strong evidence for
certain violations. For example, during the last Olympic Games many athletes
were expelled from the games for tweeting racially charged content [54].
55
7. Authentication and Authorization
provider. One of the benefits over OpenID and Facebook Connect is that the
identity provider (e-mail provider) does not find out which web service the
user is trying to use. On the other hand, while the identity provider does not
learn the relaying party, the relaying party learns the users identity on the
identity providers service; i.e., his e-mail address. PseudoID [152] employs
blind cryptographic signatures to eliminate this privacy concern. Moreover,
while Facebook Connect and Google Login associate the user with a social
profile and may share some of that information with the third-party web
service, BrowserID does not. While BrowserID and Facebook Connect seem
to eliminate the need for web services to maintain and manage the security
credentials for their users, they also present single points of failure that, if
abused could result in domino-like security failures. For instance, a user who
has enabled Facebook Connect to log in to a plethora of web services, he only
needs to manage the Facebook password. However, if the same password
is also used for another service that does not support Facebook Connect, a
potential leak from either Facebook or that service could allow an attacker
access to all the services connected to that users Facebook identity. Another
example, is the case where security flaws in the single-sign-on system enable
an attacker to access the victims account in any of the services supporting
such password-less login [391].
Adaptive cryptographic hash functions, such as bcrypt [323] and scrypt [313],
have been proposed to address the increasing ease with which password
hashes can be cracked. These hash functions can adapt to hardware evolution,
by deliberately wasting resources - either computational or memory - during
a hash validation. By employing such hash functions, a web site can slow
down an attacker sufficiently in cracking a particular user password. However,
this also requires that the service invests additional resources into generating
56
7.6. Research Gaps
57
7. Authentication and Authorization
58
8 Security of Mobile Devices
I the need for a secure and reliable infrastructure has never been more
apparent. Although connectivity is provided at large by WLAN networks,
true mobility is only possible through the cellular infrastructure. Ericsson
forecasts 80% of the world population will have WCDMA/HSPA (3G) coverage
and 35% will benefit from an LTE (4G) connectivity by 2016. During the single
month of September 2012, 11 million automobile were connected to the mobile
network and recent forecasts refer to over 50 Exabytes of data being exchanged
by mobile devices and smartphones have been recently reported [172].
To give just one example, with more than 500 million of activations reported
in Q3 2012, Android mobile devices are becoming ubiquitous and trends
show that the pace is unlikely to slow [267]. Android devices are extremely
appealing: powerful, with a functional and easy-to-use user interface for
accessing sensitive user and enterprise data, they can easily replace traditional
computing devices, especially when information is consumed rather than
produced.
Application marketplaces, such as Google Play and the Apple App Store,
drive the entire economy of mobile applications. For instance, with more than
600,000 applications installed, Google Play has generated revenues of about
237M USD per year [161]. The prospect of such a fortune, combined with the
quite unique Android ecosystem, with its high turnovers and access to sensitive
data, has unfortunately also attracted the interests of cybercriminals, with the
result that there is an alarming increase in the rate of malware strikes against
Android devices. Breaches of users privacy (e.g., access to address books and
GPS coordinates) [416], monetization through premium SMS and calls [416],
and colluding malware to bypass 2-factor authentication schemes [150, 231]
are all real threats rather than a fictional forecast. Recent studies back up
such statements, reporting how mobile marketplaces have been abused to host
malware or legitimate-seeming applications in which malicious components
are embedded [414].
This clearly reflects a shift from an environment in which malware was
developed for fun, to the current situation, where malware is distributed for
8. Security of Mobile Devices
The consequences of infected mobile devices will affect all users alike. Smart-
phones have now become ubiquitous, and they are a constant presence in
almost every household. However, we currently lack flexible and efficient poli-
cies to regulate private-to-enterprise bring-your-own-device (BYOD) contexts,
just to give an example. How can we effectively implement evasion-resistant
techniques for information leakage detection? How can we detect, mitigate, or
contain unknown malicious behaviors?
60
8.3. What Is the Worst That Can Happen?
61
8. Security of Mobile Devices
information through native methods and IPC, TaintDroid patches JNI call
bridges and the Binder IPC library. TaintDroid is effective, as it allows tainting
to propagate between many different levels, and efficient, as it does so with a
very low overhead. Unfortunately, this comes at the expense of low resiliency
and transparency: modifying internal Android components inevitably exposes
TaintDroid to a series of detection and evasion techniques [121, 341, 355].
DroidBox is a dynamic in-the-box Android malware analyzer [372] that
uses the custom instrumentation of the Android system and kernel to track a
samples behavior, relying on TaintDroid to perform taint tracking of sensitive
information [167]. Building on TaintDroid and instrumenting Androids inter-
nal components makes DroidBox prone to the problems of in-the-box analyses:
malware can detect and evade the analyses or, worse, even disable them.
Andrubis [7] is an extension to the Anubis dynamic malware analysis
system to analyze Android malware [99, 220]. According to its web site, it is
mainly built on top of both TaintDroid [167] and DroidBox [372] and it thus
shares their weaknesses (mainly due to operating in-the-box).
CopperDroid performs automatic out-of-the-box dynamic behavioral anal-
ysis of Android malware [11, 331]. To this end, CopperDroid presents a unified
system call-centric analysis to characterize low-level OS-specific and high-level
Android-specific behaviors, including IPC and RPC interactionsof paramount
importance on Android. Based on the observation that such behaviors are all
eventually achieved through the invocation of system calls, CopperDroids
VM-based dynamic system call-centric analysis is able to faithfully describe
the behavior of Android malware whether it is initiated from Java, JNI or
native code execution. Based on the observation that Android applications are
inherently user-driven and feature a number of implicit but well-defined entry
points, CopperDroid furthermore describes the design and implementation
of a stimulation approach aimed at disclosing additional malware behaviors.
The authors carried out an extensive evaluation of the system to assess its
effectiveness on three different Android malware data sets: one of more than
1,200 samples belonging to 49 Android malware families (Android Malware
Genome Project); one containing about 400 samples over 13 families (Contagio
project); and a final one, previously unanalyzed, comprising more than 1,300
samples, provided by McAfee. Their experiments show that CopperDroids
unified system call-based analysis faithfully describes OS- and Android-specific
behaviors, while a proper malware stimulation strategy (e.g., sending SMS,
placing calls) successfully discloses additional behaviors in a non-negligible
portion of the analyzed malware samples.
Google Bouncer [260], as its name suggests, is a service that bounces
malicious applications off from the official Google Play (market). Little is
known about it, except that it is a QEMU-based dynamic analysis framework.
62
8.4. State of the Art
All the other information come from reverse-engineering attempts [303] and it
is thus hard to compare it to any other research-oriented approach.
DroidMOSS [414] relies on signatures for detecting malware in app markets.
Similarly, DroidRanger [417] and JuxtApps [207] identify known mobile mal-
ware repackaged in different apps. Although quite successful, signature-based
techniques limit the detection effectiveness only to known malware (and it
is vulnerable to the adoption of reflection, native code, and obfuscation in
general).
Enck et al. [168] reported on a study of Android permissions found in
a large dataset of Google Play apps, aimed at understanding their security
characteristics. Such an understanding is an interesting starting point to
bootstrap the design of techniques that are able to enforce security policies [402]
and avoid the installation of apps requesting a dangerous combination [169]
or an overprivileged set of permissions [178, 312]. Although promising, the
peculiarity of Android apps (e.g., a potential combination of Java and native
code) can easily elude policy enforcement (when confined to protecting the Java
APIas represented by the state-of-the-art) or collude to perform malicious
actions while maintaining a legitimate-seeming appearance. This clearly calls
for continuing research in this direction.
Aurasium [402] is an app rewriting framework (Java only) that enables
dynamic and fine-grained policy enforcement of Android applications. Unfor-
tunately, working at the application level exposes Aurasium to easy detection
or evasion attacks by malicious Android applications. For example, regular
applications can rely on native code to detect and disable hooks in the global
offset table, even without privilege escalation exploits.
SmartDroid [413] makes use of hybrid analyses that statically identify paths
leading to suspicious actions (e.g., accessing sensitive data) and dynamically
determine UI elements that take the execution flow down paths identified by
the static analysis. To this end, the authors instrument both the Android emula-
tor and Androids internal components to infer which UI elements can trigger
suspicious behaviors. In addition, they evaluate SmartDroid on a testbed
of 7 different malware samples. Unfortunately, SmartDroid is vulnerable to
obfuscation and reflection, which make it hardif not impossibleto statically
determine every possible execution path.
Anand et al. propose ACTEve [83], an algorithm that utilizes concolic
execution to automatically generate input events for smartphone applications.
ACTEve is fully automatic: it does not require a learning phase (such as
capture-and-replay approaches) and uses novel techniques to prevent the path-
explosion problem. Unfortunately, the average running time of ACTEve falls
within the range of hours, which makes it ill-suited to automated large scale
analyses or practical in-device detection.
63
8. Security of Mobile Devices
64
8.6. Example Problems
erated anomaly alerts to feed an accurate mobile security dashboard that helps
in the understanding and management of new mobile malware outbreaks.
65
9 Legacy Systems
68
9.5. State of the Art
as an attack. To determine the CFG, one could employ either static or dynamic
analysis. However, none is simple in practicestatic analysis has an inherent
difficulty in resolving indirect branch targets, while dynamic analysis often
covers only a part of a programs execution paths. Several ways of approaching
the problem have been proposed: for example a combination of static and dy-
namic analysis by Xu et al. [401], value set analysis presented by Balakrishnan
et al. [90], and a framework proposed by Kinder et al. [237], which combines
control and data flow analysis by means of abstract interpretation. The CFI
policy is enforced at runtime, and a possible implementation may compare the
target address of each control-flow transfer, i.e., each jump, call, or return, to a
set of allowed destinations.
CFI does not detect non-control-diverting attacks, but it is a useful and
cheap-to-enforce policy, which effectively stops the non-control-diverting ones.
The mechanism realized by Abadi et al. [76] employs binary rewriting, and re-
quires neither recompilation nor source-code access. The average performance
overhead is 15%, with a maximum of 45%.
Runtime host solutions take advantage of the wealth of information present
when a vulnerable application is running to protect against attacks. Dynamic
Taint Analysis (DTA), proposed by Denning et al. [149] and later implemented
in TaintCheck [299], and a plethora of other systems [110, 134, 138, 209, 320, 354],
is one of the few techniques that protect legacy binaries against memory cor-
ruption attacks on control data. The technique is implemented by transparently
modifying the runtime environment. In a nutshell, untrusted data from the
network is tagged as tainted, and its propagation is tracked throughout a
program execution. An alert is generated (only) if an exploit takes place, e.g.,
when the address of a function to be invoked is tainted (this never happens in
a benign situation). The technique proves to be reliable and generate few, if
any, false positives. However, it can slow down the protected application by an
order of magnitude, and in practice, it is limited to non-production machines
such as honeypots or malware analysis engines. Furthermore, DTA can usually
detect only control-flow diverting attacks, so it does not defend against the
non-control-diverting ones.
The above solutions are good at stopping control-flow diversions, but
powerless against corruption of non-control data. As a response to this problem,
BodyArmour [356, 357] is a tool chain to bolt a layer of protection onto existing
C binaries to shield them from state-of-the-art memory corruption attacks,
including the non-control-diverting ones. It employs dynamic information
flow tracking. First, it monitors the execution of a vulnerable application
to understand the layout of memory, and unearth buffer locations and sizes.
Later, it hardens the application so that buffer overflows are no longer possible.
However, this technique is based on dynamic analysis, so it protects only those
69
9. Legacy Systems
parts of the program that were observed in the learning phase. This means that,
if a function has not been executed at all, its vulnerabilities will go undetected.
We do not consider detection mechanisms such as anomaly detection or
behavior-based approaches. Although great deal of research has investigated the
applications of these techniques to detect attacks, reducing the number of false
positives is still the core problem for these systems.
70
9.7. Example Problems
dicators, they are too generic, and they suffer from low precision or recall
values. Moreover, most of the current approaches operate at the granularity of
modules or files, which cannot be applied to legacy software for which we do
not have the source code. As observed by Zimmermann et al. [418], we need
metrics that exploit the unique characteristics of vulnerabilities, e.g., buffer
overflows or integer overruns.
Summarizing, an important research question is how to evaluate the com-
plexity of code fragments in existing binaries, so that we can focus the effective
yet expensive symbolic execution on code that is more likely to have exploitable
vulnerabilities.
71
10 Usable Security
To put it briefly, there are several reasons why a user may choose not to use
the security mechanisms provided, preferring to go with a more convenient,
unsecured solution instead. It is the researchers responsibility to keep the
target system safe anyway. .
74
10.4. What Is the Worst That Can Happen?
75
10. Usable Security
When iterating though these problems, the reader might think that no
progress has been made in terms of usable security. In fact, there have been
more or less successful initiatives to create a homogenous security and authen-
tication environment. One of the most prominent examples is OAuth [57], a
protocol for secure and even transient authentication among different appli-
cations. Even though the protocol has been widely adopted, it still requires
developers to adhere to its standard when developing their solution. And this
requirement is not always easy to meet. Besides, once advanced to Version
2.0, the main contributor to the protocol, Eran Hammer, decided to leave
the initiative, and even requested that his name be removed from related
documents.
76
10.6. Research Gaps
77
10. Usable Security
10.7.1 Authentication
Authentication played a major role in the above attack. One security guideline
is not to use two vital e-mail accounts for a two-factor authentication. If one
should get compromised, it is quite possible that the other will be lost as well.
Instead, the backup e-mail should be used only once, or on a different system
(e.g., SMS two factor authentication) altogether. From the users perspective,
however, it makes sense to use the same e-mail over and over again. No
ordinary user is able to create e-mail aliases as needed and remember them
afterwards. The same is true for passwords. If the same password is used
on multiple platforms (e.g., Google, Facebook), it is easy to compromise both
once the password is somehow derived. It is quite easy to depict the problem.
Solving it, on the other hand, is a completely different story. The sensible thing
would be not to allow secondary e-mail accounts as user verification. To be
effective, however, such a guideline has to be enforced throughout different
platforms, and that is something no one can guarantee. Alternatively, a new
method could be devised that ensures that daisy-chaining accounts together
is not possible, while users still have the possibility of retrieving their lost or
forgotten credentials. This topic could serve as the foundation of a research
thesis.
10.7.2 Backup
People are constantly told how important it is to backup their data. But who
has terabytes of external storage lying around? And if so, how often does the
ordinary user bother to actually create a backup? The answer is certainly: "Not
often enough." Devising a safe, cheap but still usable form of backup would be
78
10.7. Example Problems
of value for many users. Again, this narrow field would certainly be suitable
for consideration in the course of a thesis.
Summing up, the threat from unusable security may not be a direct, imme-
diate one, but it is there nevertheless. As security researchers, we are therefore
obliged to develop our systems, not only with the basic concept in mind, but
with a broader view that also considers the users who actually have to deal
with it. Several of these shortcomings are intertwined with sociological and
psychological aspects, calling for interdisciplinary research to create usable
solutions.
79
11 The Botnet that Would not Die
Nugache
Storm
Sality v3
Sality v4
Waledac
ZeroAccess v1
ZeroAccess v2
Kelihos v1
Kelihos v2
Kelihos v3 abandoned
Miner active
disabled
Zeus
Jan 2006 Jan 2007 Jan 2008 Jan 2009 Jan 2010 Jan 2011 Jan 2012
Figure 11.1: Lifetimes of botnet variants. Note that Sality has been up since
2007.
have received much attention from security researchers and law enforcement
in takedown attempts [157, 363]. In response, botnet controllers (botmasters)
have designed and implemented new architectures to make their botnets more
resilient. Some botnets use fast-flux DNS, which relies on a large pool of
IPs belonging to compromised systems to mask out the actual address of an
attacker-controlled mothership that delivers malicious content or runs scam
campaigns [296, 309].
In addition, attackers have implemented domain generation algorithms
(DGAs) to generate pseudo-random domain names used for C&C dynamically
(e.g., depending on seed values such as the current date/time and Twitter
trends) [85]. For instance, the Zeus DGA currently generates a thousand
domains a day.
However resilient such botnets have become, they have not stopped security
researchers and law enforcement from taking them down. This is not the case
for a new breed of botnets, based on peer-to-peer (P2P) technology, that appear
to have been designed with resilience in mind.
In a P2P botnet, bots connect to other bots to exchange C&C traffic, elim-
inating the need for centralized servers. As a result, P2P botnets cannot be
disrupted using the traditional approach of attacking critical centralized infras-
tructure. Figure 11.1 shows the lifespans of twelve different botnets based on
P2P technology. Observe that ZeroAccess has been up since 2009. Incredibly,
the Sality botnet which counts about a million nodes has been operational
since 2007. In 2007, George W. Bush was still in the White House, nobody had
heard about Stuxnet, and Nokia still reigned supreme in the mobile phone
market!
To be sure, researchers did manage to take down several P2P botnets in
the past. The Storm and Waledac botnets were probably the most famous of
these [211, 362]. Thus, P2P by itself does not provide resilience. The point is
that modern botnets explicitly incorporate resilience in their design, with fall-
back C&C channels (often based on DGA recovery), heavy encryption, signed
82
11.1. What Is the Problem?
11.1.2 Resilience
We will distinguish between different kinds of resilience for P2P networks:
83
11. The Botnet that Would not Die
To make matters even worse, advanced bot software like Zeus is extremely
stealthy. The probability of an AV scanner detecting the malware is not very
high. Given the wealth of resilience measures already available in active
botnets, and the incredibly long lifespans of some of these infrastructures, we
anticipate that very soon, there will be botnets that we cannot take down using
sinkholing, that will be extremely hard to crawl or measure (by the time you
have charted a significant percentage of the botnet, the churn will have made
your numbers obsolete), and that are not susceptible to spoofed commands.
84
11.4. What Is the Worst That Can Happen?
85
11. The Botnet that Would not Die
tive mixing in P2P botnets and its consequences for network resilience and
recovery [409].
To establish an idea of the threats we may expect from future P2P botnets,
several researchers have designed their own theoretical highly resilient P2P
botnets [213, 295, 360, 403, 404]. We are currently not aware of any existing P2P
botnets based on ideas from these academic proposals.
11.6.2 Legislation
Currently, most countries lack a legal framework for dealing with these new
advanced botnets. We have no guidelines as to how and when we can take
more invasive measures against resilient malicious infrastructures. Nor is there
clarity as to who should do it. And there is even less clarity when it comes to
striking back at machines that are located in other countries (assuming you
can even tell). We need research into the desirability of such measures, the
boundaries for such measures, etc.
Legal boundaries for hacking back. Can we provide clear and intelligible
legislation that clarifies under what circumstances the government is
allowed to strike back at botnets? Which computers is it allowed to
attackjust the ones in its own country or may borders be crossed if
need be (and if so, under what circumstances)?
Poisoned fruit. Rather than taking the P2P botnets down, can we disrupt their
efficiency sufficiently to make them less interesting for attackers? For
instance, can we inject an overwhelming amount of fake data, so that it
becomes hard for the bot masters to extract the useful information?
86
12 Malware
than 128 million malware samples in their database [73]. Symantec reports
that in 2012, one in 291 emails contained some form of malware [75].
At the same time, the increasing professionalism of cyber criminals makes
defending against sophisticated malware increasingly hard. Once sophisticated
tricks of the most skilled virus authors, advanced evasion techniques like code
obfuscation, packing, and polymorphism are now the norm in most instances
of malicious code. Using polymorphism, the malware is mutated so that each
instance acquires a unique byte pattern, thereby making signature extraction
for the whole breed infeasible. As the number of new vulnerabilities and
malware variants grows at a frantic pace, detection approaches based on
threat signatures, which are employed by most virus scanners and intrusion
detection systems, cannot cope with the vast number of new malicious code
variants [302].
88
12.4. What Is the Worst That Can Happen?
89
12. Malware
90
12.7. Example Problems
Botnets. They are probably the best example of how malware is used for
monetary gain. Botnets rely solely on unsolicited installations of mali-
cious programs on ordinary computers to function. Other than targeted
attacks, they aim at infecting ordinary users, who often may not know
how to secure their systems properly. Chapter 11 provides detailed infor-
mation about a Botnets modus operandi. The basic enabler for such an
installation, however, is still Windows-based malware.
91
12. Malware
92
13 Social Engineering and Phishing
o one should underestimate the impact that the human factor has
N on security. Any chain is only as strong as its weakest link, and that
is also the case with computer security. Consequently, adversaries
often employ various techniques of social engineering to bypass or break
security mechanisms by manipulating users. An accurate description of social
engineering has been given by Kevin Mitnick [1], arguably among the most
famous figures in this context:
are no longer effective. Therefore, the malware authors must resort to social-
engineering-based techniques for persuading victims to install legitimate-
looking applications that hide malicious functionalities.
94
13.3. What Is Expected to Happen?
95
13. Social Engineering and Phishing
96
13.4. What Is the Worst That Can Happen?
Early in 2012, the most senior military commander of NATO was the victim
of an impersonation attack. Attackers created a fake Facebook account with
his name, hoping to trick people close to him into divulging personal details
or sensitive information [200]. While this threat was prevented, in the future,
more elaborate attacks can result in malicious individuals gaining access to
critical information. Furthermore, recent reports [37] revealed that during the
2008 USA presidential campaigns of Barack Obama and John McCain, hackers
employing phishing techniques were able to gain access to emails and a range
of campaign files, from policy position papers to travel plans. As reported
by CNN [10], during a security summit US Defense Secretary Chuck Hagel
attributed this cyber-attack to the Government of China.
In another case with potential devastating effects, at least two power dis-
tribution companies were the target of social engineering attacks [214]. The
companies were called by an individual posing as a representative of a large
software company, warning them that their computer had been infected by
viruses and requesting them to run certain, potentially vulnerable, services.
Luckily, the transmission managers identified the social engineering attacks
and did not comply. However, this does not mean that such an attack will
not succeed in the future, and one can only imagine the damage that could be
caused by malicious adversaries gaining access to such a critical infrastructure
as that of a power distribution company.
97
13. Social Engineering and Phishing
Dhamijas [154] is among the most cited works regarding phishing. Although
dating back to 2006, this research was the first that provided empirical evidence
about the reasons why phishing attacks work: by analyzing the (ineffectiveness
of) standard security indicators, the paper corroborates with objective findings
the anecdotal (true) belief that phishing and social engineering work because
of the scarce security education of the typical users. Albeit simple, this concept
is still the foundation of todays social-engineering-based attacks. Three years
later, Bilge et al. in [104] showed that, once an attacker has managed to
infiltrate a victims online social circle, the victim will trust the attacker and
blindly follow any link they post, regardless of whether the victim knows the
attacker in real life. Throughout the years, phishing and social engineering
have evolved to find new ways to exploit trust relationships between human
subjects, or between a human subject and an institution or website. A recent
example is the abuse of short URLs [265] (e.g., bit.ly, tinyurl.com), to which
users have grown accustomed thanks to Twitter, to spread phishing and other
malicious resources on social networks and email campaigns. Unfortunately,
many years later, security warnings, which are supposed to help inexperienced
users to distinguish between trustworthy and non-trustworthy websites or
resources, are still of debatable effectiveness [79].
98
13.5. State of the Art
99
13. Social Engineering and Phishing
100
13.7. Example Problems
This will shed more light on their modus operandi and, hopefully, allow
researchers and practitioners to track them.
101
14 Grand Challenges
1. will be able to know which data they have created (such as text, photos,
videos, cookies, web requests, etc.),
2. will be able to know what data they have given to third parties (such as text,
photos, cookies, web requests, IP addresses, etc.)
3. will have the capability to refuse disclosure of some data (such as cookies
and IP addresses) and still expect a decent level of service,
4. will have the capability to delete their own data which they have created (both
from the local storage as well as from the cloud), and
5. will, under an appropriate legal framework, have the ability to ask past
recipients of their data to erase them as well.
14. Grand Challenges
104
Part II: Related Work
15 Cyber Security: A Crisis
of Prioritization
P tion is considered one of the seminal works in this area [100, 249].
Ordered by the US President and implemented by the Presidents Infor-
mation Technology Advisory Committee, the report suggested that Information
Technology Infrastructure is Critical, treated software as a major vulnera-
bility, suggested that current solutions (such as endless patching) are not
adequate, urged for the development of fundamentally new security models
and methods, and elevated Cyber Security to the level of National Importance.
15.2 Recommendations
The main recommendations of the Report include:
NSF budget in this area be increased by $90 million annually.
The PITAC recommends that the Federal government intensify its efforts
to promote recruitment and retention of cyber security researchers and
students at research universities, with a goal of at least doubling the size
of the civilian cyber security fundamental research community by the
end of the decade.
108
16 Forward: Managing Threats in
ICT Infrastructures
Q uantifying the cyber security priorities in 2008 and 2009, the FOR-
WARD project (http://www.ict-forward.eu/), supported by the Eu-
ropean Commission, established working groups to (i) discuss best
practices, progress and priorities, (ii) set the research agendas to be pursued in
Europe, and (iii) identify possible new research areas and threats that need to
be addressed.
The main result of the project, the FORWARD Whitebook [133], contained
detailed and concrete scenarios of how adversaries could exploit the emerging
threats identified by the FORWARD project working groups to carry out their
malicious actions. These scenarios illustrated future dangers and provided
arguments to policy makers that are needed to support research in critical
areas.
are accessible from the Internet and possibly in-turn also depend on its
services.
110
16.2. Recommendations
Human Factors. Humans are usually the weakest link in the security
of several systems. Either as insider threats, or as end users, they may
be the key element in the success of a cyber attack. Humans interact
with security in several aspects including (i) user interfaces, which clearly
convey a security (or lack thereof) to the user, (ii) insiders, who may
have the access mechanisms needed to compromise a system, (iii) social
engineering using all forms of communication, such as email, VoIP
phones, and Instant Messaging Systems, and (iv) targeted attacks to
individuals or groups of people.
16.2 Recommendations
The Report provided the following Recommendations:
111
16. Forward
112
17 Federal Plan for Cyber Security and
Information Assurance for Research
and Development
R issues of the Federal Plan for Cyber Security and Information Assurance
Research and Development [217], developed in 2006 by the Interagency
Working Group (IWG) on Cyber Security and Information Assurance (CSIA),
an organization under the United States National Science and Technology
Council (NSTC). This Cabinet-level Council is the principal means for the US
President to coordinate science and technology across the diverse parts of the
Federal research and development enterprise.
The Plan presents baseline information and provides a coordinated intera-
gency framework for addressing critical gaps in cyber security and information
assurance capabilities and technologies. The Plan focuses on interagency
research and development (R&D) priorities and is intended to complement
agency-specific prioritization and R&D planning efforts in cyber security and
information assurance. The Plan also describes the key Federal role in support-
ing R&D to strengthen the overall security of the IT infrastructure through the
development of fundamentally more secure next-generation technologies.
Address cyber security and information assurance R&D needs that are
unique to critical infrastructures.
Develop and accelerate the deployment of new communication protocols
that better assure the security of information transmitted over networks.
Support the establishment of experimental environments such as test-
beds that allow government, academic, and industry researchers to
conduct a broad range of cyber security and information assurance
development and assessment activities.
Provide a foundation for the long-term goal of economically informed,
risk-based cyber security and information assurance decision making.
Provide novel and next-generation secure IT concepts and architectures
through long-term research.
Facilitate technology transition and diffusion of Federally funded R&D
results into commercial products and services and private-sector use.
17.2 Recommendations
The Plan recommends that cyber security and information assurance be ac-
corded high priority at all levels of the Government and be integral to the
design, implementation, and use of all components of the IT infrastructure. A
critical observation is that the work that began with the Plan of identifying and
prioritizing Federal cyber security and information assurance R&D efforts must
be an ongoing process. Continuation of ongoing interagency coordination
is needed to focus Federal R&D activities on the most significant threats to
critical infrastructures and Federal agency missions and to maximize the gains
from these investments.
The specifics of the strategy proposed in this Plan are articulated in a set of
findings and recommendations, summarized as follows:
114
17.2. Recommendations
Build security in from the beginning. The Federal cyber security and
information assurance R&D portfolio should support fundamental R&D
exploring inherently more secure next-generation technologies that will
replace todays patching of the current insecure infrastructure.
Develop and apply new metrics to assess cyber security and information
assurance. As part of roadmapping, Federal agencies should develop and
implement a multi-agency plan to support the R&D for a new generation
of methods and technologies for cost-effectively measuring IT component,
network, and system security. These methods should evolve with time.
Institute more effective coordination with the private sector. The Federal
government should review private-sector cyber security and information
assurance practices and countermeasures to help identify capability gaps
in existing technologies, and should engage the private sector in efforts to
better understand each others views on cyber security and information
115
17. Federal Plan for Cyber Security
116
18 EffectsPlus Trust and Security
Research Roadmap
S with the partners Hewlett-Packard Ltd, SAP AG, ATOS and Universit
degli Studi di Trento, the EFFECTSPLUS project is a Coordination and
support action aimed at the following five objectives:
To analyse results from current and earlier trust and security work (i.e.,
from calls prior to Call 5), and to identify key areas and key players from
new projects (Call 5) for the preparation of clustering and roadmapping
activity
As part of its activities, the project held a research roadmapping and project
clustering event in Brussels on 2930 March, 2011. The participants at the
event were representatives of European FP7 projects in the broad area of Trust
and Security, and the objective was to identify core challenges and issues for
research to be addressed in the timeframe 20102020 (in connection with the
Horizon 2020 strategy), as well as a shared vision of trust and security in the
Future Internet.
18. EffectsPlus
18.2 Changes
The changes foreseen can be grouped into:
118
18.3. Vision
18.3 Vision
The vision for the future of security starts with an improvement of privacy
and awareness for users, and their empowerment to take care of their data.
Similarly, businesses need to become more risk-aware.
Developers will need tools to build secure applications (as automatically
as possible) and securely compose and orchestrate services, satisfying well-
defined security properties. This will avoid security issues being a barrier to
technology improvements.
An increase in user accountability will need to be carefully counterbalanced
by a protection of human rights.
18.4 Challenges
A number of challenges must be met before this vision can be realized. Users
and businesses must become able to understand and control their security and
privacy posture, also through appropriate security metrics. Building secure and
resilient systems must become easier, through appropriate tools and assurance
frameworks.
Improved tools to express security policies and certify digital identities,
as well as improved handling of system security issues and guaranteeing
availability, are also a pressing need.
Several challenges are related with the new developments in the field: cloud
computing, the rise of mobile devices, and socioeconomic changes.
119
18. EffectsPlus
1. Integration of the Internet and of digital devices into users lives and
business processes, leading to increased dependence on the availability,
security and privacy of these devices. Cyber-physical security and the
security of mobile, cloud-connected devices will be of paramount interest.
2. Growth of the scale of the problem: the Internet will grow to include mul-
tiple billions of devices, traffic and complexity will grow, the number and
prevalence of attacks will grow, perimeters will shatter and applications
will become complex orchestrations of services
3. Tools, metrics and frameworks will need to evolve to cope with the
unprecedented scale and integration of digital devices and processes in
our lives
120
19 Digital Government: Building a 21st
Century Platform to Better Serve
the American People
T Serve the American People report outlines a digital strategy for the
federal government in the United States to embrace new technologies,
in a coordinated fashion, to better serve its citizens. Data and services should,
as they say, be available anywhere, anytime, on any device in a secure fashion to
encourage innovation. The roadmap outlines three major goals to be reached
by the following four guiding principles: an information-centric approach for
the data, a shared platform for consistency and to reduce costs, a focus on
the needs of the users of the data, and, finally, an emphasis on security and
privacy.
The roadmap outlines the beginning of a coordinated path where data and
services from the government can be better used in society. The roadmap
complements a number of other directives.
122
20 H2020: The Challenge of Providing
Cyber Security
nder the vision of 2020 the challenges in cyber security are often
20.1.3 Recommendations
The group of experts proposed the following instruments to address the
challenges of cyber security:
Promote demonstrators
Give incentives
124
20.2. Societal Perspective
Ensuring ethical and societal issues are duly examined Both ethi-
cal/human rights aspects and technical relevance should be part of the
evaluation process.
125
21 Trust in the Information Society:
A Report of the Advisory Board
RISEPTIS
The weakest links in the data storage chain. Digital data can be stored on
high-profile servers, where sophisticated security mechanisms are applied.
However, it is still hard to guarantee that those data are never going to leak,
since data are frequently transferred in data storage devices, such as CDs or
USB sticks. These devices offer easy physical access. An attacker can alter
the integrity of the data in transfer, break their confidentiality, or recycle the
data with malicious purpose. Data encryption, if effectively used, can reduce
such risks. However, data breach degrades the trust associated with victim
companies or governments, even when the attacker reaps no practical benefit.
21.2 Recommendations
The report provided the following recommendations:
Recommendation 1: The EC should stimulate interdisciplinary research, tech-
nology development and deployment that addresses the trust and security
needs in the Information Society. The priority areas are:
128
21.2. Recommendations
allows for the full spectrum of activities from public administration or banking
with strong authentication when required, through to simple web activities
carried out in anonymity.
Recommendation 4: The EC should work towards the further development
of the EU data protection and privacy legal frameworks as part of an overall
consistent ecosystem of law and technology that includes all other relevant
frameworks, instruments and policies. It should do so in conjunction with
research and technology developments.
Recommendation 5: The EC together with industrial and public stakeholders
should develop large-scale actions towards building a trustworthy Information
Society which make use of Europes strengths in communication, research,
legal structures and societal values - for example, a Cloud which complies
with European law.
Recommendation 6: The EC should recognize that, in order to be effective,
it should address the global dimension and foster engagement in international
discussions, as a matter of urgency, to promote the development of open
standards and federated frameworks for cooperation in developing the global
Information Society.
129
22 ENISA Threat Landscape and Industrial
Threat Reports
hat are the future threats in cyber security? This is the main
2. Malware. Trojans are the most reported class of malware (also on mobile
devices). Trojan Autorun and Conficker worm are still two of the top
threats worldwide. Today, money making (e.g., through banking creden-
tial stealing) is the main motivation behind malware campaigns. With
Koobface, the miscreant have showed that social networks are an effective
distribution channel.
3. Code Injection Attacks. SQL injection attacks are today more popular than
cross-site scripting attacks than in the past. Hacktivists rely on SQL
injection attacks against their target websites.
7. Targeted Attacks have been increasing during the first half of 2012, with
spear-phishing as the topmost common infection vectors against industrial-
control systems. Other tools used in targeted attacks include platform-
specific malware: Stuxnet, Duqu, and Flamer.
132
22.2. Emerging Issues per Area
133
22. ENISA Threat Landscape
Cloud Computing and Big Data Cloud services such as remote backup and
application services have become a consumer product. This, together
with the massive use of social networks, yielded vast amounts of data,
which are now an attractive target for attackers. Furthermore, the tight
integration of cloud services in mobile devices will lead to a larger cloud
attack surface, which could be exploited to compromise data privacy and
to collect intelligence to prepare targeted attacks.
22.3 Recommendations
The ENISA report gives a series of recommendations that highlight the im-
portance and usefulness of future threat landscapes in information security
management. More precisely, rather than the typical list of recommendation
for authorities and decision or policy makers, the report points out a list of
open issues that need to be addressed by future threat landscapes. As this
aspect is purely methodological, we present it in Section A.2
134
22.4. Industrial Reports
represent the best information we can get to estimate what kind of problems
we will have to face in the short-term future.
Therefore, we decided to complete this chapter on previous work on re-
search roadmaps by reviewing a number of industrial reports, looking for
recurrent patterns or common threats that we can reuse in our study. In
particular, we covered the threat forecast published by Microsoft [377], Im-
perva [216], WebSense [393], McAfee [271], Symantec [367], Kaspersky [232],
Bullguard [115], and by the Georgia Tech Information Security Center [193].
Mobile Malware. The emergence of mobile malware is one of the main con-
cern we observed in the industrial reports. However, if the area itself is
certainly the major threat on the landscape, the way in which it is going
to materialize in the short term can vary. For instance, some experts see
an increase in exploitation of vulnerabilities that target the OS and on
the development of drive-by downloads; others think that malware will
focus on the payment capabilities of phones to either steal information
or to purchase applications developed by the attacker. Some companies
even forecast the appearance of the first mass worm for Android devices.
Finally, a common point in many reports is the likely increase of mobile
adware, e.g., software that sends pop-up alerts to the notification bar,
adds new icons, or change some of the phone settings.
135
22. ENISA Threat Landscape
Ransomware. The ransom business model has been tried in the past but
several companies think that it will soon increase in popularity as a quick
way for criminals to monetize their attacks. In fact, victims faced with
the risk of losing their data are often willing to pay a ransom in the hope
of regaining access. The raise of ransomware is going to affect all devices,
from traditional computers to mobile phonesand it will be supported
by the release of new and more sophisticated ransomware kits.
136
23 Cyber Security and Information
Intelligence Research Workshop
138
23.3. Recommendations
23.3 Recommendations
Rather than a list of recommendations for authorities, the workshops devised
and discussed a number of game-changing R&D themes that are essential
for cyber security. Addressing the hard problems in security requires signifi-
cant resources, and a long-term R&D vision focusing on the game-changing
approaches. It is a multidisciplinary and challenging effort.
139
24 Cyber Security Strategy of the
European Union
Y that makes it crystal clear: the chances are that someone somewhere is
attacking youand you dont even know it. In February 2013, the European
Commission, together with the High Representative of the Union for Foreign
Affairs and Security Policy, published a report on the cyber security strategy
of the European Union [171]. The main goal of this report is to identify
priorities for protecting and promoting citizens rights online and for protecting
cyberspace from incidents and malicious activities.
The strategy further details the roles and responsibilities of different stake-
holders, both nationally and EU-wide, in working together to strengthen cyber
security. While identifying national governments as the best place to deal with
cyber security challenges, the report suggests actions for EU member states as
well as EU institutions and the industry.
The same core values of the EU that apply in the physical world, apply
to the digital world as well.
142
24.2. Strategic Priorities
143
24. Cyber Security Strategy
dinate the research agendas of civilian and military organizations. Europol and
ENISA should identify emerging trends and prerequisites to combat evolving
cybercrime.
144
25 The Dutch National Cyber Security
Research Agenda
25.1 Contexts
Concrete research questions typically arise in a specific context, which may
involve a certain technology (e.g., cloud computing), or a particular application
domain (e.g., finance), or a combination of the two. Still, similar research
questions arise across different contexts, representing broader research themes.
Below, we make an inventory of the most important contexts, regarding both
technology and application domain. The next section then lists the underlying
research themes that represent the central challenges for security across these
contexts.
25. The Dutch National Cyber Security Research Agenda
inc p o n s
res
finance
ide e
ty
smart grid
nti
nt
ide
domestic
industrial
NCSRA control
policy mgmt
trust
data
law
enforcement
defense
leg gulat
re
isla ion
media &
tio
sig y
news
n&
n
de urit
e-government
by sec
ma ri commercial
n a sk e-health
ge l
me ona s
nt rati citie
cybe ope capa
r crim underground e r
e cyb
economy
25.1.1 Technologies
A central technology that is at the heart of most applications is of course the
Internet, fixed or mobile. Telecommunications and the Internet are merging
more and more to become an all-IP environment, where traditional telephony
(voice), television (video) and data exchange are integrated into a multi-channel
system. Services can be provided to large groups of users (broadcasting and
information sharing), specific groups (narrowcasting and user communities)
as well as single users. As many critical applications have come to rely on the
Internet, the Internet itself has become an ever more critical infrastructure.
An important technology that builds on top of this is cloud computing.
Cloud computing uses the communication infrastructure provided by the
Internet to provide on-demand computation resources, in the form of raw
computing power or more specialized services, by offering infrastructure,
platforms or software as a service. Cloud computing is increasingly used
by individual citizens and companies to outsource their ICT needs. Cloud
computing may offer economic benefits, by exploiting economies of scale
and releasing users from maintenance tasks. However, cloud computing
also introduces extra (communication) costs, and raises serious challenges for
security.
Another important technological trend is pervasive systems: We are rapidly
moving away from the desktop-model, and increasingly interact with ICT tech-
nology that is integrated into everyday objects and activities, that make up
the Internet of things. Some of these devices are fully connected to the wider
146
25.1. Contexts
Internet (e.g., smartphones), but many are not (e.g., wearable computing, or
smart insulin pumps).
In some respects, cloud computing and pervasive systems are polar oppo-
sites: Cloud computing relies on massive centralization of data and processing
power, whereas pervasive systems rely on a diverse distribution of processing
power.
As we are surrounded by ever more devices with embedded electronics,
the digital and physical worlds are rapidly converging to form one cyber-
physical realityin our homes and our workplaces, in semi-public places such
as care homes and hospitals, in public spaces such as the (public) transport
systems, and ultimately at a global level. Pervasive systems have important
implications for privacy, security and trust and have a profound impact on
our social lives. Also, some of the devices, for instance RFID tags, have only
very limited capabilities when it comes to information storage, processing and
communication, so that traditional methods for providing security are not
feasible.
Besides the location of computation and hardware capabilities, the nature
of the software involves a myriad of variations that have serious implications
for security. Information exchange no longer has a predominantly client-server
nature. Information is exchanged in a peer-to-peer fashion, more and more
information is shared via social networks, and security sensitive operations
(related to banking, healthcare, taxes, etc.) all occur via the Internet with a
variety of technologies for such aspects as authentication and protection.
Commercial. Trust in ICT and Internet is vital for its ongoing and
increasing use, and for companies to reap the economic benefits that this
brings. Online commerce is increasingly important, and lack of trust in
147
25. The Dutch National Cyber Security Research Agenda
ICT and Internet could undermine its growth: it has been estimated that
increased trust in Internet by consumers could provide an additional 1.4
billion euro of online trade by 2014.
Just as private individuals are concerned with privacy, companies are
concerned with their intellectual property and confidential information.
Companies are faced with a rapid rise of ever more sophisticated cyber
attacks aimed at corporate espionage.
Industrial Control Systems. SCADA (short for Supervisory Control
and Data Acquisition) systems monitor and control large industrial es-
tablishments, such as chemical and nuclear plants, and large parts of the
national critical infrastructure, such as the water, gas and electricity sup-
ply. Disruptions in SCADA systems can have disastrous consequences,
but their increasing reliance on ICTincluding the Internethas made
them vulnerable to remote attacks. Stuxnet is the most famous among
numerous examples here. This is especially worrying as these systems
are attractive targets for hacktivism, cyber terrorism, and cyber war.
Improving the resilience of the ICT-dependent critical infrastructure
requires research into these infrastructures as they exist today, to un-
derstand their interdependencies and judge their reliability in the face
of attacks, and research into more secure components (hardware, soft-
ware, or communication protocols) that may be needed to build a secure
infrastructure.
Smart grid. A new piece of technical critical infrastructure very much
under development today is the smart grid, the next-generation electricity
and utilities network that uses ICT technology to provide two-way digital
communications between suppliers and appliances at consumers homes,
including smart meters and in the near future also batteries in electric
cars. Smart grids are being promoted as a way of addressing energy
independence, global warming and emergency resilience issues, but the
increased reliance on ICT also introduces new threats, to both the security
of the overall Grid and the privacy of individual users.
Finance. Financial institutions or their customers are increasingly often
victims of targeted cyberattacks, carried out by well-funded criminal
organizations, which are becoming ever more sophisticated. These attacks
are costing millions to consumers, retailer, and financial institutions (e.g.,
through skimming, stolen credit-card numbers, DoS attacks on payment
infrastructure) and undermine the trust that is crucial for the financial
system to operate.
Present security solutions (firewalls, intrusion detection systems) cannot
cope with this level of sophistication. There is a clear need for new
148
25.1. Contexts
defensive approaches that can deal with targeted attacks and exploits
of zero-day vulnerabilities. Identity fraud is also a major issue here.
New payment schemes (e.g., using NFC mobile phones) may offer new
technical and commercial possibilities, but also raise new security and
privacy concerns.
149
25. The Dutch National Cyber Security Research Agenda
Law enforcement. Similarly, the use of ICT has become a crucial tool
in many tasks related to tracking down, monitoring and apprehending
criminals. Research is needed into improving these abilities without
jeopardizing the safety and privacy of citizens. Some of these capabilities
are extensions to existing capabilities like tapping, whereas others are
entirely new. The research challenges include many different fields:
technical, legal, sociological, etc. Again, attribution in particular is a
difficult but hugely important research task.
Media and news outlets. News outlets and mass media are important
channels for disseminating information and thus make attractive targets
for attackers. Both the news outlets and the threats are increasingly
digital. In the past, we have witnessed compromises of government
websites like that of Syria by Anonymous, but more traditional television
150
25.2. Research Themes
and radio broadcasts and printed media are possible targets too. Besides
these traditional media, the domain also includes new media outlets such
as blogs, social networks, tweets, etc.
151
25. The Dutch National Cyber Security Research Agenda
152
25.2. Research Themes
153
25. The Dutch National Cyber Security Research Agenda
154
25.2. Research Themes
155
25. The Dutch National Cyber Security Research Agenda
156
A Methodologies
In this appendix we outline the methodology used to create this Red Book. We
list the people we mobilized, the way we organized them, and the interactions
we had. We also list the procedure we followed and the meetings (physical and
virtual) we had. For completeness we also include the methodologies used in
the creation of the Crisis of Prioritization Report (section 15 in page 107) and
the ENISA Threat Landscape Report (section 22 in page 131).
A.2.1 Recommendations
ENISA recommends that future threat landscape reports and security-management
actors follow some guidelines:
Collect and develop better evidence concerning attack vectors and the
impact achieved by adversaries. This is a challenging objective, but will
ensure a more rigorous estimation of threat importance and trends.
Include the user perspective, which is still absent from the majority of
threat reports (i.e., users are not often the target of such reports).
Develop use cases for threat landscapes, which will help in the analysis
of the feasibility of future threats based on current and past landscapes.
158
B SysSec Threats Landscape Evolution
Scenario 1 Scenario 2
Plausible Future
Scenario n
The efforts of the SysSec consortium are also benefiting from ENISA [268],
PITAC [316], World Economic Forum Reports [394] and NATO Comprehensive
Approach [280] methodologies.
Generally, the idea is closely related to the application of the scenario
method. A method which uses scenarios as synthetic descriptions of events
with driving factors, which are classified as important from the subject-matter
experts.
B. SysSec Threats Landscape Evolution
160
B.4. SysSec 2013 Threats Landscape
Assets
PersonalAssets SocietalAssets Professional
Threat-Enabler Assets
Privacy Digital Financial Health Critical GRIDS Data Sales
(Human Iden- Assets Safety Infras- Clouds etc.
Rights) tity tructures
Anonymous Inter- Medium Medium Low Low Medium Low Medium
net Access
Ubiquitous net- High High High High Low Low Low
works
Human Factors High High High High High High High
Insider attacks High High High High High High High
Botnets High High High High High High High
Program Bugs High High High High High High High
Scale and Complex- High High High High High High High
ity
Mobile Devices High High High High Medium Low High
24/7 connectivity High High High High Low Low High
more private info High High Medium High Low Low Low
available
smart meters High High Medium High High Low Low
Tracking High High Medium High Low Low High
Smart Environ- High High Medium High Medium Low High
ments
Unsecured Devices High High High High Low Low High
Social networks High High Medium Medium Low Low Low
Cyber-physical con- High Low Medium High High Low High
nectivity for Infras-
tructures, cars etc.
Organized Cyber High High High High High Low High
Crime
Mobile Malware High High High High Medium Low High
SCADA Malware Low Low Low Low High Low Medium
Privacy Digital Financial Health Critical GRIDS Data Sales
(Human Iden- Assets Safety Infras- Clouds etc.
Rights) tity tructures
161
B. SysSec Threats Landscape Evolution
162
B.4. SysSec 2013 Threats Landscape
Very Hard
Everybody
Quite Unlikely
Technological
Difculty
Likelihood
Targets
Simple Solution
Certain
Few
Low High Well studied Still Unexplored In 5 years Time Now
Impact (damage)
Need for Research
Very Hard
Everybody
Technological
Simple Solution Difculty
Likelihood
Targets
Certain
Few
Everybody
Technological
Simple Solution Difculty
Likelihood
Targets
Certain
Few
Figure B.3: Generalized results from D4.2: Second Report on Threats on the
Future Internet and Research Roadmap about System Security Aspects of Privacy,
Collection, Detection and Prevention of Targeted Attacks and Security of New and
Emerging Technologies trends.
163
B. SysSec Threats Landscape Evolution
Everybody
Quite Unlikely
Technological
Difculty
Likelihood
Targets
Simple Solution
Certain
Low High Well studied Still Unexplored Few In 5 years Time Now
Impact (damage)
Need for Research
Usable Security
Very Hard
Everybody
Quite Unlikely
Technological
Difculty
Likelihood
Targets
Simple Solution
Certain
Few
Figure B.4: Generalized results from D4.2: Second Report on Threats on the
Future Internet and Research Roadmap about Security of Mobile Devices and
Usable Security trends.
164
Bibliography
166
Bibliography
167
Bibliography
[69] Obama Order Sped Up Wave of Cyberattacks Against Iran, June 2012.
http://www.nytimes.com/2012/06/01/world/middleeast/obama-ordered-wave-
of-cyberattacks-against-iran.html?pagewanted=all&_r=1&.
[70] U.S. Team and Israel Developed Iran Worm, June 2012. http://online.wsj.com/article/
SB10001424052702304821304577440703810436564.html.
[71] Cyberattack leaves natural gas pipelines vulnerable to sabotage, Feb. 2013.
http://www.csmonitor.com/Environment/2013/0227/Exclusive-Cyberattack-
leaves-natural-gas-pipelines-vulnerable-to-sabotage.
[72] Hello, Unit 61398, Feb. 2013. http://www.economist.com/blogs/analects/2013/02/
chinese-cyber-attacks.
[73] McAfee Threats Report: First Quarter 2013. http://www.mcafee.com/us/resources/
reports/rp-quarterly-threat-q1-2013.pdf, 2013.
[74] SANS SCADA and Process Control Security Survey, Feb. 2013. https://www.sans.org/
reading_room/analysts_program/sans_survey_scada_2013.pdf.
[75] Symantec Internet Security Threat Report 2013. http://www.symantec.com/content/
en/us/enterprise/other_resources/b-istr_main_report_v18_2012_21291018.en-
us.pdf, 2013.
[76] M. Abadi, M. Budiu, U. Erlingsson, and J. Ligatti. Control-flow integrity. In Proceedings of
the 12th ACM conference on Computer and Communications Security (CCS), 2005.
[77] B. Adida. Beamauth: two-factor web authentication with a bookmark. In Proceedings of the
14th ACM conference on Computer and communications security, CCS 07, pages 4857, New
York, NY, USA, 2007. ACM.
[78] G. Aggrawal, E. Bursztein, C. Jackson, and D. Boneh. An analysis of private browsing
modes in modern browsers. In Proceedings of 19th Usenix Security Symposium, 2010.
[79] D. Akhawe and A. P. Felt. Alice in warningland: A large-scale field study of browser
security warning effectiveness. In Proceedings of the 22th USENIX Security Symposium, 2013.
[80] P. Akritidis, C. Cadar, C. Raiciu, M. Costa, and M. Castro. Preventing memory error
exploits with WIT. In Proceedings of the 2008 IEEE Symposium on Security and Privacy,
S&P08, 2008.
[81] C. Albanesius. Google: Wi-Fi Sniffing Collected Whole E-Mails, URLs, Passwords. PC-
MAG.COM, October 2010. http://www.pcmag.com/author-bio/chloe-albanesius.
[82] S. Alexander. Defeating compiler-level buffer overflow protection. USENIX ;login:, 30(3):59
71, June 2005.
[83] S. Anand, M. Naik, H. Yang, and M. Harrold. Automated concolic testing of smartphone
apps. In Proc. of FSE, 2012.
[84] Anonymous. Why we protest. http://whyweprotest.net/community/.
[85] M. Antonakakis, R. Perdisci, Y. Nadji, N. Vasiloglou, S. Abu-Nimeh, W. Lee, and D. Dagon.
From Throw-Away Traffic to Bots: Detecting the Rise of DGA-Based Malware. In Proceedings
of the 21st USENIX Security Symposium, 2012.
[86] C. Arthur. Conficker is a lesson for MPs - especially over ID cards. The Guardian,
http://www.guardian.co.uk/technology/2009/apr/02/conficker-parliament-
security-charles-arthur, 2009.
[87] E. Athanasopoulos, A. Makridakis, S. Antonatos, D. Antoniades, S. Ioannidis, K. G.
Anagnostakis, and E. P. Markatos. Information Security. In T.-C. Wu, C.-L. Lei, V. Rijmen,
and D.-T. Lee, editors, ISC 08 Proceedings of the 11th international conference on Information
Security, volume 5222 of Lecture Notes in Computer Science, pages 146160. Springer Berlin
Heidelberg, 2008.
168
Bibliography
[88] A. Avizienis, J.-C. Laprie, B. Randell, and C. Landwehr. Basic concepts and taxonomy of
dependable and secure computing. IEEE Trans. Dependable Secur. Comput., 1(1):1133, Jan.
2004.
[89] R. Baden, A. Bender, N. Spring, B. Bhattacharjee, and D. Starin. Persona: an online social
network with user-defined privacy. In Proceedings of the ACM SIGCOMM 2009 conference on
Data communication - SIGCOMM 09, page 135. ACM Press, 2009.
[90] G. Balakrishnan and T. Reps. Analyzing memory accesses in x86 binary executables. In
Procedings of the Conference on Compiler Construction, CC04, 2004.
[91] M. Balduzzi, C. Gimenez, D. Balzarotti, and E. Kirda. Automated discovery of param-
eter pollution vulnerabilities in web applications. In Proceedings of the 18th Network and
Distributed System Security Symposium, 2011.
[92] M. Balduzzi, C. Platzer, T. Holz, E. Kirda, D. Balzarotti, and C. Kruegel. Abusing social
networks for automated user profiling. In International Symposium on Recent Advances in
Intrusion Detection (RAID 2010), 9 2010.
[93] J. Baltazar, J. Costoya, and R. Flores. The Real Face of KOOBFACE : The Largest Web 2 . 0
Botnet Explained, 2009.
[94] D. Balzarotti(Ed.). D4.1: First Report on Threats on the Future Internet and Research
Roadmap. Technical report, SySSeC Consortia, Sept. 2011.
[95] D. Balzarotti(Ed.). D4.2: Second Report on Threats on the Future Internet and Research
Roadmap. Technical report, SySSeC Consortia, Sept. 2012.
[96] A. Baratloo, N. Singh, and T. Tsai. Transparent run-time defense against stack smashing
attacks. In Proceedings of the USENIX Annual Technical Conference, June 2000.
[97] A. Barth, J. Caballero, and D. Song. Secure Content Sniffing for Web Browsers or How
to Stop Papers from Reviewing Themselves. In Proceedings of the 30th IEEE Symposium on
Security & Privacy, Oakland, CA, May 2009.
[98] A. Barth, C. Jackson, and J. C. Mitchell. Robust Defenses for Cross-Site Request Forgery. In
Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS), 2008.
[99] U. Bayer, C. Kruegel, and E. Kirda. Ttanalyze: A tool for analyzing malware. In Proc. of
EICAR, 2006.
[100] M. Benioff and E. Lazowska, editors. Cyber Security: A Crisis of Prioritization. National
Coordination Office for Information Technology Research and Development, Feb. 2005.
[101] J. Bennett, Y. Lin, and T. Haq. The Number of the Beast, 2013. http://blog.fireeye.
com/research/2013/02/the-number-of-the-beast.html.
[102] E. Bhatkar, D. C. Duvarney, and R. Sekar. Address obfuscation: an efficient approach
to combat a broad range of memory error exploits. In In Proceedings of the 12th USENIX
Security Symposium, 2003.
[103] R. Biddle, S. Chiasson, and P. Van Oorschot. Graphical passwords: Learning from the first
twelve years. ACM Comput. Surv., 44(4):19:119:41, Sep 2012.
[104] L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda. All your contacts are belong to us. In
Proceedings of the 18th international conference on World wide web - WWW 09, page 551. ACM
Press, 2009.
[105] H. Bojinov, D. Boneh, R. Cannings, and I. Malchev. Address space randomization for
mobile devices. In Proceedings of the fourth ACM conference on Wireless network security,
WiSec 11, pages 127138, New York, NY, USA, 2011. ACM.
[106] H. Bojinov, E. Bursztein, and D. Boneh. XCS: Cross Channel Scripting and Its Impact
on Web Applications. In CCS 09: Proceedings of the 16th ACM conference on Computer and
communications security, pages 420431, New York, NY, USA, 2009. ACM.
[107] J. Bonneau. Statistical metrics for individual password strength. In Proceedings of the 20th
international conference on Security Protocols, pages 7686, 2012.
169
Bibliography
[108] J. Bonneau, C. Herley, P. C. v. Oorschot, and F. Stajano. The quest to replace passwords: A
framework for comparative evaluation of web authentication schemes. In Proceedings of the
2012 IEEE Symposium on Security and Privacy, pages 553567, 2012.
[109] Y. Boshmaf, I. Muslukhov, K. Beznosov, and M. Ripeanu. The socialbot network: when bots
socialize for fame and money. In Proceedings of the Annual Computer Security Applications
Conference. ACM, 2011.
[110] E. Bosman, A. Slowinska, and H. Bos. Minemu: The Worlds Fastest Taint Tracker. In
Proceedings of 14th International Symposium on Recent Advances in Intrusion Detection, RAID11,
2011.
[111] P. Boykin and V. Roychowdhury. Leveraging social networks to fight spam. Computer,
38(4):6168, Apr. 2005.
[112] C. Braz, A. Seffah, and D. MRaihi. Designing a trade-off between usability and security:
A metrics based-model. Human-Computer InteractionINTERACT 2007, pages 114126, 2007.
[113] T. Bukowski. ZeuS v3 P2P Network Monitoring, 2012. Technical Report by CERT.pl.
[114] Bulba and Kil3r. Bypassing StackGuard and StackShield. Phrack, 10(56), 2001.
[115] BullGuard. Security predictions for 2013. Internet. http://blog.bullguard.com/2013/
01/bullguards-security-predictions-for-2013.html, 2013.
[116] P.-M. Bureau. Same Botnet, Same Guys, New Code: Win32/Kelihos. In VirusBulletin, 2011.
[117] J. J. C. Cowan, S. Beattie and P. Wagle. Pointguard: Protecting pointers from buffer overflow
vulnerabilities. In Proceedings of the 12th USENIX Security Symposium, August 2003.
[118] C. Cadar, D. Dunbar, and D. Engler. KLEE: Unassisted and automatic generation of high-
coverage tests for complex systems programs. In Proceedings of the 8th USENIX Symposium
on Operating Systems Design and Implementation, OSDI08, 2008.
[119] J. Carr. Inside Cyber Warfare. Mapping the Cyber Underworld. OReilly Media, Dec. 2011.
[120] C. Castillo. Spitmo vs Zitmo: Banking Trojans Target Android, Sept. 2011. http://blogs.
mcafee.com/mcafee-labs/spitmo-vs-zitmo-banking-trojans-target-android.
[121] L. Cavallaro, P. Saxena, and R. Sekar. On the limits of information flow techniques for
malware analysis and containment. In DIMVA, pages 143163, 2008.
[122] D. Chappell. Introducing Windows CardSpace. msdn, April 2006. http://msdn.
microsoft.com/en-us/library/aa480189.aspx.
[123] S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, S. Savage, K. Koscher,
A. Czeskis, F. Roesner, and T. Kohno. Comprehensive experimental analyses of automotive
attack surfaces. In Proceedings of the 20th USENIX Security Symposium, 2011.
[124] S. Chen, J. Xu, E. C. Sezer, P. Gauriar, and R. K. Iyer. Non-control-data attacks are realistic
threats. In Proceedings of the 14th USENIX Security Symposium, 2005.
[125] W. Cheng, Q. Zhao, B. Yu, and S. Hiroshige. TaintTrace: Efficient Flow Tracing with
Dynamic Binary Rewriting. In Proc. of ISCC, pages 749754, 2006.
[126] W. Cheswick. Rethinking passwords. Communications of the ACM, 56(2):4044, 2013.
[127] E. Chien, L. OMurchu, and N. Falliere. W32.Duqu: the precursor to the next stuxnet. In
USENIX conference on Large-Scale Exploits and Emergent Threats. USENIX Association, Apr.
2012.
[128] V. Chipounov, V. Kuznetsov, and G. Candea. S2E: A platform for in vivo multi-path analysis
of software systems. In Proceedings of the 16th Intl. Conference on Architectural Support for
Programming Languages and Operating Systems, ASPLOS11, 2011.
[129] L. S. Clair, L. Johansen, W. Enck, M. Pirretti, P. Traynor, P. McDaniel, and T. Jaeger. Password
exhaustion: Predicting the end of password usefulness. In A. Bagchi and V. Atluri, editors,
ICISS, volume 4332 of Lecture Notes in Computer Science, pages 3755. Springer, 2006.
170
Bibliography
[130] G. Cluley. 600,000+ compromised account logins every day on facebook, official figures
reveal. nakedsecurity news from SOPHOS, October 2011. http://nakedsecurity.sophos.
com/2011/10/28/compromised-facebook-account-logins/.
[131] CNBC. False rumor of explosion at white house causes stocks to briefly plunge. http:
//www.cnbc.com/id/100646197.
[132] F. B. Cohen. Operating system protection through program evolution. Computers and
Security, 12:565584, Oct. 1993.
[133] T. F. Consortium. White book: Emerging ICT Threats, Jan. 2010. http://www.ict-
forward.eu/media/publications/forward-whitebook.pdf.
[134] M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham. Vigilante:
end-to-end containment of internet worms. In Proceedings of the 20th ACM Symposium on
Operating Systems Principles, SOSP05, 2005.
[135] A. Costin, J. Isacenkova, M. Balduzzi, A. Francillon, and D. Balzarotti. The role of phone
numbers in understanding cyber-crime. In PST 2013, 11th International Conference on Privacy,
Security and Trust, July 10-12, 2013, Tarragona, Catalonia, Spain, 2013.
[136] C. Cowan, C. Pu, D. Maier, M. Hinton, J. Walpole, P. Bakke, S. Beattie, A. Grier, P. Wagle,
and Q. Zhang. Stackguard: Automatic adaptive detection and prevention of buffer-overflow
attacks. In Proceedings of the 7th USENIX Security Symposium, January 1998.
[137] C. Cowan, P. Wagle, C. Pu, S. Beattie, and J. Walpole. Buffer overflows: attacks and defenses
for the vulnerability of the decade. In Proceedings of the DARPA Information Survivability
Conference and Exposition (DISCEX), 2000.
[138] J. R. Crandall and F. T. Chong. Minos: Control Data Attack Prevention Orthogonal to
Memory Model. In Proceedings of the 37th annual IEEE/ACM International Symposium on
Microarchitecture, MICRO 37, 2004.
[139] A. Cui and M. Costello. Hacking Cisco Phones, 2012.
[140] A. Cui, M. Costello, and S. J. Stolfo. When firmware modifications attack: A case study of
embedded exploitation. In Proceedings of the ISOC Symposium on Network and Distributed
Systems Security (NDSS), 2013.
[141] A. Cui and S. J. Stolfo. A quantitative analysis of the insecurity of embedded network
devices: results of a wide-area scan. In Proceedings of the 26th Annual Computer Security
Applications Conference (ACSAC), 2010.
[142] L. Cutillo, R. Molva, and T. Strufe. Safebook: A privacy-preserving online social network
leveraging on real-life trust. IEEE Communications Magazine, Consumer Communications and
Networking Series, 47(12):94101, 2009.
[143] CWE/SANS. CWE/SANS TOP 25 Most Dangerous Software Errors. www.sans.org/top25-
software-errors, 2011.
[144] D. Dagon, G. Gu, C. P. Lee, and W. Lee. A Taxonomy of Botnet Structures. In Proceedings of
the 23rd Annual Computer Security Applications Conference, 2007.
[145] G. Danezis and P. Mittal. Sybilinfer: Detecting sybil nodes using social networks. In
Network and Distributed System Security Symposium - NDSS, 2009.
[146] S. K. Das, K. Kant, and N. Zhang. Handbook on Securing Cyber-Physical Critical Infras-
tructure. 2012.
[147] C. R. Davis, S. Neville, J. M. Fernandez,
J.-M. Robert, and J. McHugh. Structured Peer-to-
Peer Overlay Networks: Ideal Botnet Command and Control Infrastructures? In Proceedings
of the 13th European Symposium on Research in Computer Security, 2008.
[148] S. J. Delany, M. Buckley, and D. Greene. Review: Sms spam filtering: Methods and data.
Expert Syst. Appl., 39(10):98999908, Aug. 2012.
[149] d. e. denning and p. j. denning. certification of programs for secure information flow.
commun. acm, 20(7):504513, 1977.
171
Bibliography
172
Bibliography
173
Bibliography
[194] V. George, T. Piazza, and H. Jiang. Technology Insight: IntelNext Generation Mi-
croarchitecture Codename Ivy Bridge. www.intel.com/idf/library/pdf/sf_2011/SF11_
SPCS005_101F.pdf, September 2011.
[195] P. Godefroid, M. Y. Levin, and D. A. Molnar. Automated Whitebox Fuzz Testing. In
Proceedings of the 15th Annual Network and Distributed System Security Symposium, NDSS08,
2008.
[196] I. Goldberg, D. Wagner, R. Thomas, and E. A. Brewer. A secure environment for untrusted
helper applications (confining the wily hacker). In Proceedings of the 5th USENIX Security
Symposium, 1996.
[197] L. H. Gomes, R. B. Almeida, and L. M. A. Bettencourt. Comparative Graph Theoretical
Characterization of Networks of Spam and Legitimate Email. In Conference on Email and
Anti-Spam (CEAS), 2005.
[198] C. Grier, S. Tang, and S. King. Secure Web Browsing with the OP Web Browser. In Security
and Privacy, 2008., pages 402416. IEEE, 2008.
[199] E. Grosse. Gmail account security in Iran. Google Blog, September 2011.
http://googleonlinesecurity.blogspot.com/2011/09/gmail-account-security-
in-iran.html.
[200] T. Guardian. China suspected of facebook attack on natos supreme allied com-
mander. http://www.guardian.co.uk/world/2012/mar/11/china-spies-facebook-
attack-nato.
[201] M. V. Gundy and H. Chen. Noncespaces: Using Randomization to Enforce Information
Flow Tracking and Thwart Cross-Site Scripting Attacks. In Proceedings of the 16th Annual
Network and Distributed System Security Symposium (NDSS), San Diego, CA, Feb. 8-11, 2009.
[202] P. Gutmann and I. Grigg. Security usability. Security & Privacy, IEEE, 3(4):5658, 2005.
[203] D. Hadziosmanovic, D. Bolzoni, P. Hartel, and S. Etalle. MELISSA: Towards Automated
Detection of Undesirable User Actions in Critical Infrastructures. 2011.
[204] D. Hadziosmanovic, D. Bolzoni, and P. H. Hartel. A log mining approach for process
monitoring in SCADA. International Journal of Information Security, 11(4):231251, Apr. 2012.
[205] J. Haldeman. The Forever War. S. F. Masterworks Series. Orion, 2011.
[206] D. Halperin, T. Kohno, T. Heydt-Benjamin, K. Fu, and W. Maisel. Security and privacy for
implantable medical devices. Pervasive Computing, IEEE, 7(1):30 39, jan.-march 2008.
[207] S. Hanna, L. Huang, E. X. Wu, S. Li, C. Chen, and D. Song. Juxtapp: A scalable system for
detecting code reuse among android applications. In DIMVA, 2012.
[208] M. Hayes, A. Walenstein, and A. Lakhotia. Evaluation of Malware Phylogeny Modelling
Systems Using Automated Variant Generation. Journal in Computer Virology, 5(4):335343,
2009.
[209] A. Ho, M. Fetterman, C. Clark, A. Warfield, and S. Hand. Practical taint-based protection
using demand emulation. In Proceedings of the 1st ACM SIGOPS/EuroSys European Conference
on Computer Systems, EuroSys06, 2006.
[210] P. Holme, B. J. Kim, C. N. Yoon, and S. K. Han. Attack Vulnerability of Complex Networks.
Physical Review E, vol. 65, 2002.
[211] T. Holz, M. Steiner, F. Dahl, E. Biersack, and F. Freiling. Measurements and Mitigation of
Peer-to-Peer-based Botnets: A Case Study on Storm Worm. In Proceedings of the 1st USENIX
Workshop on Large-Scale Exploits and Emergent Threats, 2008.
[212] M. Honan. How apple and amazon security flaws led to my epic hacking. Wired Magazine,
August 2012. http://www.wired.com/gadgetlab/2012/08/apple-amazon-mat-honan-
hacking/.
[213] R. Hund, M. Hamann, and T. Holz. Towards Next-Generation Botnets. In Proceedings of the
2008 European Conference on Computer Network Defense, 2008.
174
Bibliography
175
Bibliography
176
Bibliography
[253] C. Lever, M. Antonakakis, B. Reaves, P. Traynor, and W. Lee. The Core of the Matter:
Analyzing Malicious Traffic in Cellular Carriers. In NDSS, 2013.
[254] J. Leyden. Conficker left Manchester unable to issue traffic tickets, 2009. http://www.
theregister.co.uk/2009/07/01/conficker_council_infection/.
[255] J. Leyden. London hospital recovers from Conficker outbreak. The Register, http://www.
theregister.co.uk/2009/08/24/nhs_hospital_conficker/, 2009.
[256] H. Li. Understanding and exploiting Flash ActionScript vulnerabilities. CanSecWest, 2011.
[257] H. Lin-Shung, W. Zack, E. Chris, and J. Collin. Protecting Browsers from Cross-Origin CSS
Attacks. In CCS 10: Proceedings of the 17th ACM Conference on Computer and Communications
Security, New York, NY, USA, 2010. ACM.
[258] B. Liu, L. Shi, Z. Cai, and M. Li. Software vulnerability discovery techniques: A survey.
In Proceedings of the 4th International Conference on Multimedia Information Networking and
Security (MINES), pages 152156, 2012.
[259] Y. Liu, P. Ning, and M. K. Reiter. False data injection attacks against state estimation in
electric power grids. Transactions on Information and System Security (TISSEC, 14(1), May
2011.
[260] H. Lockheimer. Bouncer. http://googlemobile.blogspot.it/2012/02/android-and-
security.html.
[261] Lookout. 2013 mobile threat predictions. https://blog.lookout.com/blog/2012/12/13/2013-
mobile-threat-predictions/.
[262] M. M. Lucas and N. Borisov. Flybynight: mitigating the privacy risks of social networking.
In Proceedings of the 7th ACM workshop on Privacy in the electronic society, 2008.
[263] W. Luo, Q. Xie, and U. Hengartner. Facecloak: An architecture for user privacy on social
networking sites. In Proceedings of the International Conference on Computational Science and
Engineering, 2009.
[264] F. Maggi. Are the con artists back? a preliminary analysis of modern phone frauds. In
Proceedings of the International Conference on Computer and Information Technology (CIT), pages
824831. IEEE Computer Society, 2010.
[265] F. Maggi, A. Frossi, S. Zanero, G. Stringhini, B. Stone-Gross, C. Kruegel, and G. Vigna.
Two years of short urls internet measurement: security threats and countermeasures. In
Proceedings of the 22nd international conference on World Wide Web, WWW 13, pages 861
872, Republic and Canton of Geneva, Switzerland, 2013. International World Wide Web
Conferences Steering Committee.
[266] F. Maggi, A. Sisto, and S. Zanero. A social-engineering-centric data collection initiative
to study phishing. In Proceedings of the First Workshop on Building Analysis Datasets and
Gathering Experience Returns for Security (BADGERS), pages 107108, New York, NY, USA,
2011. ACM.
[267] T. Mai. Android Reaches 500 Million Activations Worldwide.
http://www.tomshardware.com/news/Google-Android-Activation-half-billion-
Sales,17556.html, 2012.
[268] L. Marinos and A. Sfakianakis. ENISA Threat Landscape. Technical report, ENISA, Sept.
2012.
[269] Mashable. What is the syrian electronic army? http://mashable.com/2012/08/10/
syrian-electronic-army/.
[270] D. Mashima and A. A. Crdenas. Evaluating Electricity Theft Detectors in Smart Grid
Networks. Research on Attacks, Intrusions and Defences Symposium, 2012.
[271] McAfee Labs. 2013 threats predictions, 2012.
177
Bibliography
[272] G. McDonald, L. O. Murchu, S. Doherty, and E. Chien. Stuxnet 0.5: The Missing Link,
Feb. 2013. http://www.symantec.com/content/en/us/enterprise/media/security_
response/whitepapers/stuxnet_0_5_the_missing_link.pdf.
[273] M. McGlohon, S. Bay, M. G. Anderle, D. M. Steier, and C. Faloutsos. SNARE: A Link
Analytic System for Graph Labeling and Risk Detection. In Proceedings of the 15th ACM
SIGKDD international conference on Knowledge discovery and data mining - KDD 09, page 1265.
ACM Press, 2009.
[274] S. McLaughlin and P. McDaniel. SABOT: specification-based payload generation for
programmable logic controllers. In ACM conference on Computer and Communications
Security. ACM Request Permissions, Oct. 2012.
[275] R. McMillan. Stolen Twitter accounts can fetch $1000. 2010. http://www.computerworld.
com/s/article/9150001/Stolen_Twitter_accounts_can_fetch_1_000.
[276] K. McNamee. Malware Analysis Report: ZeroAccess/Sirefef, 2012. Technical Report by
Kindsight Security Labs.
[277] M. Miculan and C. Urban. Formal analysis of facebook connect single sign-on authentica-
tion protocol. In SOFSEM, volume 11, pages 2228, 2011.
[278] B. Miller and D. Rowe. A survey of SCADA and critical infrastructure incidents. In Annual
conference on Research In Information Technology. ACM Request Permissions, Oct. 2012.
[279] M. Miller, T. Burrell, and M. Howard. Mitigating software vulnerabilities, July 2011.
http://www.microsoft.com/download/en/details.aspx?displaylang=en&id=26788.
[280] Z. Minchev and V. Shalamanov. Scenario Generation and Assessment Framework Solution
in Support of the Comprehensive Approach. In RTO-MP-SAS-081, Symposium on "Analytical
Support to Defence Transformation", Boyana, Bulgaria, April 26-28, pages 2212216, 2010.
[281] D. Misener. Rise of the socialbots: They could be influencing you on-
line. 2011. http://www.cbc.ca/news/technology/story/2011/03/29/f-vp-misener-
socialbot-armies-election.html.
[282] A. Mislove, M. Marcon, K. P. Gummadi, P. Druschel, and B. Bhattacharjee. Measurement
and analysis of online social networks. In Proceedings of the 7th ACM SIGCOMM conference
on Internet measurement - IMC 07, page 29. ACM Press, 2007.
[283] A. Mislove, A. Post, and P. Druschel. Ostra: Leveraging trust to thwart unwanted com-
munication. In Proceedings of the 5th USENIX Symposium on Networked Systems Design and
Implementation, number i, pages 1530, 2008.
[284] Mitre. Common Vulnerabilities and Exposures (CVE). http://cve.mitre.org/, 2011.
[285] A. Mohaisen, A. Yun, and Y. Kim. Measuring the mixing time of social graphs. In
Proceedings of the 10th annual conference on Internet measurement - IMC 10, page 383. ACM
Press, 2010.
[286] M. Moore. Houses of Parliament computers infected with Conficker virus,
2009. http://www.telegraph.co.uk/technology/microsoft/5057605/Houses-of-
Parliament-computers-infected-with-Conficker-virus.html.
[287] F. Moradi, T. Olovsson, and P. Tsigas. An Evaluation of Community Detection Algorithms
on Large-Scale Email Traffic. In 11th International Symposium on Experimental Algorithms.
Springer-Verlag, 2012.
[288] F. Moradi, T. Olovsson, and P. Tsigas. Towards modeling legitimate and unsolicited email
traffic using social network properties. In Proceedings of the Fifth Workshop on Social Network
Systems - SNS 12, 2012.
[289] E. Morozov. Swine flu: Twitters power to misinform. 2009. http://neteffect.
foreignpolicy.com/posts/2009/04/25/swine_flu_twitters_power_to_misinform.
[290] T. Morris, A. Srivastava, B. Reaves, and W. Gao. A control system testbed to validate critical
infrastructure protection concepts. . . . Infrastructure Protection . . . , 2011.
178
Bibliography
179
Bibliography
[309] E. Passerini, R. Paleari, L. Martignoni, and D. Bruschi. Fluxor: Detecting and monitoring
fast-flux service networks. In D. Zamboni, editor, DIMVA, volume 5137 of Lecture Notes in
Computer Science, pages 186206. Springer, 2008.
[310] PaX Team. Address space layout randomization. http://pax.grsecurity.net/docs/
aslr.txt.
[311] PaX Team. PaX non-executable pages design & implementation. http://pax.grsecurity.
net/docs/noexec.txt.
[312] H. Peng, C. Gates, B. Sarma, N. Li, Y. Qi, R. Potharaju, C. Nita-Rotaru, and I. Molloy. Using
probabilistic generative models for ranking risks of android apps. In CCS, 2012.
[313] C. Percival. Stronger key derivation via sequential memory-hard functions. BSDCan 2009,
2009.
[314] L. Pitre-Cambacds, M. Tritschler, and G. N. Ericsson. Cybersecurity Myths on Power
Control Systems: 21 Misconceptions and False Beliefs. Power Delivery, IEEE Transactions on,
26(1), 2011.
[315] M. Pistoia, S. Chandra, S. J. Fink, and E. Yahav. A survey of static analysis methods for
identifying security vulnerabilities in software systems. IBM Syst. J., 46(2):265288, Apr.
2007.
[316] PITAC. Cyber Security: A Crisis of Prioritization. Technical report, Presidents Information
Technology Advisory Committee - PITAC, Feb. 2005.
[317] I. Polakis, G. Kontaxis, S. Antonatos, E. Gessiou, T. Petsas, and E. P. Markatos. Using social
networks to harvest email addresses. In Proceedings of the 9th Annual ACM Workshop on
Privacy in the Electronic Society, pages 1120. ACM, 2010.
[318] I. Polakis, M. Lancini, G. Kontaxis, F. Maggi, S. Ioannidis, A. D. Keromytis, and S. Zanero.
All your face are belong to us. In Proceedings of the 28th Annual Computer Security Applications
Conference on - ACSAC 12, page 399. ACM Press, 2012.
[319] P. Porras, H. Saidi, and V. Yegneswaran. An analysis of confickers logic and rendezvous
points. Technical Report SRI International Technical Report, 2009. http://mtc.sri.com/
Conficker.
[320] G. Portokalidis, A. Slowinska, and H. Bos. Argos: an Emulator for Fingerprinting Zero-Day
Attacks. In Proceedings of the 1st ACM SIGOPS/EuroSys European Conference on Computer
Systems 2006, EuroSys06, 2006.
[321] M. Prasad and T. cker Chiueh. A binary rewriting defense against stack based overflow
attacks. In Proceedings of the USENIX Annual Technical Conference, June 2003.
[322] R. W. Proctor, M.-C. Lien, K.-P. L. Vu, E. E. Schultz, and G. Salvendy. Improving computer
security for authentication of users: influence of proactive password restrictions. Behav Res
Methods Instrum Comput, 34(2):1639, 2002.
[323] N. Provos and D. Mazires. A future-adaptive password scheme. ATEC 1999.
[324] S. J. Prowell, M. Pleszkoch, K. D. Sayre, and R. C. I. S. G. T. I. . I. P. Linger. Automated
vulnerability detection for compiled smart grid software. Innovative Smart Grid Technologies
(ISGT), 2012 IEEE PES, 2012.
[325] F. Qin, C. Wang, Z. Li, H.-s. Kim, Y. Zhou, and Y. Wu. LIFT: A Low-Overhead Practical
Information Flow Tracking System for Detecting Security Attacks. In Proc. of MICRO, pages
135148, 2006.
[326] C. Queiroz, A. Mahmood, and Z. S. G. I. T. o. Tari. SCADASimA Framework for Building
SCADA Simulations. Smart Grid, IEEE Transactions on, 2(4), 2011.
[327] M. Raciti and S. Nadjm-Tehrani. Embedded Cyber-Physical Anomaly Detection in Smart
Meters. 2012.
[328] R. Radvanovsky and J. Brodsky. Handbook of Scada/Control Systems Security. CRC PressI Llc,
Feb. 2013.
180
Bibliography
[329] F. Raja, K. Hawkey, S. Hsu, K.-L. C. Wang, and K. Beznosov. A brick wall, a locked door,
and a bandit: a physical security metaphor for firewall warnings. In Proceedings of the
Seventh Symposium on Usable Privacy and Security, SOUPS 11, pages 1:11:20, New York,
NY, USA, 2011. ACM.
[330] V. Reding. the EU Data Protection Reform 2012: Making Europe the Standard Setter
for Modern Data Protection Rules in the Digital Age. http://europa.eu/rapid/press-
release_SPEECH-12-26_en.htm.
[331] A. Reina, A. Fattori, and L. Cavallaro. A system call-centric analysis and stimulation
technique to automatically reconstruct android malware behaviors. In EuroSec, April 2013.
[332] C. Reis and S. Gribble. Isolating web programs in modern browser architectures. In
Proceedings of the 4th ACM European Conference on Computer Systems (EuroSys), pages 219
232. ACM, 2009.
[333] E. Rescorla. Security holes... Who cares? In Proceedings of the 12th USENIX Security
Symposium, pages 7590, Aug. 2003.
[334] R. Richmond. Stolen Facebook Accounts for Sale. 2010. http://www.nytimes.com/2010/
05/03/technology/internet/03facebook.html?_r=0.
[335] R. Roberts. Malware Development Life Cycle. Virus Bulletin Conf., (October), 2008.
[336] W. Robertson and G. Vigna. Static Enforcement of Web Application Integrity Through
Strong Typing. In Proceedings of the 18th USENIX Security Symposium, Montreal, Quebec,
August 2009.
[337] C. Rossow, D. Andriesse, T. Werner, B. Stone-Gross, C. J. Dietrich, and H. Bos. P2pwned
modeling and evaluating the resilience of peer-to-peer botnets. In Security & Privacy
(Oakland), San Francisco, CA, USA, May 2013.
[338] I. Rouf, H. Mustafa, M. Xu, W. Xu, R. Miller, and M. Gruteser. Neighborhood watch:
security and privacy analysis of automatic meter reading systems. In ACM conference on
Computer and Communications Security. ACM Request Permissions, Oct. 2012.
[339] RSA. Apt summit findings. http://www.rsa.com/innovation/docs/APT_findings.pdf.
[340] A. Rubin and D. Geer. A survey of web security. Computer, 31(9):3441, 1998.
[341] G. Sarwar, O. Mehani, R. Boreli, and D. Kaafar. On the Effectiveness of Dynamic Taint
Analysis for Protecting Against Private Information Leaks on Android-based Devices. In
10th International Conference on Security and Cryptography (SECRYPT), 2013.
[342] P. Saxena, S. Hanna, P. Poosankam, and D. Song. FLAX: Systematic Discovery of Client-
side Validation Vulnerabilities in Rich Web Applications. In Proceedings of the 17th Annual
Network and Distributed System Security Symposium (NDSS).
[343] Security Focus. Vulnerabilities. http://www.securityfocus.com/bid, 2011.
[344] D. Seeley. Password cracking: a game of wits. Commun. ACM, 32(6):700703, June 1989.
[345] R. Sekar. An Efficient Black-box Technique for Defeating Web Application Attacks. In
Proceedings of the 16th Annual Network and Distributed System Security Symposium (NDSS),
San Diego, CA, Feb. 8-11, 2009.
[346] F. J. Serna. CVE-2012-0769, the case of the perfect info leak, Feb. 2012. http://zhodiac.
hispahack.com/my-stuff/security/Flash_ASLR_bypass.pdf.
[347] H. Shacham, M. Page, B. Pfaff, E.-J. Goh, N. Modadugu, and D. Boneh. On the effectiveness
of address-space randomization. In Proceedings of the 11th ACM conference on Computer and
Communications Security (CCS), 2004.
[348] F. T. Sheldon and C. Vishik. Moving toward trustworthy systems: R&d essentials. IEEE
Computer, 2010.
[349] Y. Shin and L. Williams. An initial study on the use of execution complexity metrics as
indicators of software vulnerabilities. In Proc. of the 7th international workshop on Software
engineering for secure systems, SESS11. ACM Press, May 2011.
181
Bibliography
[350] S. Sidiroglou and A. D. Keromytis. Countering network worms through automatic patch
generation. IEEE Security and Privacy, 3(6):4149, 2005.
[351] G. Sinclair, C. Nunnery, and B. Kang. The Waledac Protocol: The How and Why, 2009.
Technical Report by Infrastructure Systems Research Lab/University of North Carolina.
[352] K. Singh, S. Bhola, and W. Lee. xbook: Redesigning privacy control in social networking
platforms. In Proceedings of the 18th USENIX Security Symposium, 2009.
[353] M. Sirivianos, K. Kim, and X. Yang. SocialFilter: Introducing social trust to collaborative
spam mitigation. 2011 Proceedings IEEE INFOCOM, pages 23002308, Apr. 2011.
[354] A. Slowinska and H. Bos. The Age of Data: Pinpointing Guilty Bytes in Polymorphic
Buffer Overflows on Heap or Stack. In Proceedings of the 23rd Annual Computer Security
Applications Conference, ACSAC07, 2007.
[355] A. Slowinska and H. Bos. Pointless tainting?: evaluating the practicality of pointer tainting.
In EuroSys, pages 6174, 2009.
[356] A. Slowinska, T. Stancescu, and H. Bos. Howard: a dynamic excavator for reverse engi-
neering data structures. In Proceedings of NDSS 2011, San Diego, CA, 2011.
[357] A. Slowinska, T. Stancescu, and H. Bos. Body armor for binaries: preventing buffer
overflows without recompilation. In Proceedings of USENIX Annual Technical Conference,
Boston, MA, June 2012.
[358] M. Srivatsa and M. Hicks. Deanonymizing mobility traces. In Proceedings of the 2012 ACM
conference on Computer and communications security - CCS 12, page 628. ACM Press, 2012.
[359] J. I. S. G. T. I. . I. P. Stamp. The SPIDERS project - Smart Power Infrastructure Demonstration
for Energy Reliability and Security at US military facilities. Innovative Smart Grid Technologies
(ISGT), 2012 IEEE PES, 2012.
[360] G. Starnberger, C. Kruegel, and E. Kirda. Overbot: A Botnet Protocol Based on Kademlia.
In Proceedings of the 4th International Conference on Security and Privacy in Communication
Networks, 2008.
[361] A. Stefanov and . I. P. Chen-Ching Liu Innovative Smart Grid Technologies ISGT. Cyber-
power system security in a smart grid environment. Innovative Smart Grid Technologies
(ISGT), 2012 IEEE PES, 2012.
[362] B. Stock, M. Engelberth, F. C. Freiling, and T. Holz. Walowdac Analysis of a Peer-to-Peer
Botnet. In Proceedings of the European Conference on Computer Network Defense, 2009.
[363] B. Stone-Gross, M. Cova, L. Cavallaro, B. Gilbert, M. Szydlowski, R. Kemmerer, C. Kruegel,
and G. Vigna. Your Botnet is My Botnet: Analysis of a Botnet Takeover. In Proceedings of
the 16th ACM Conference on Computer and Communications Security, 2009.
[364] G. Stringhini, C. Kruegel, and G. Vigna. Detecting Spammers on Social Networks. In
Proceedings of the 26th Annual Computer Security Applications Conference, 2010.
[365] Symantec. Spam report: Hacked personal email accounts used to scam contacts. http:
//www.symantec.com/articles/article.jsp?aid=20080729_spam_report.
[366] Symantec. Stuxnet Using Three Additional Zero-Day Vulnerabilities.
http://www.symantec.com/connect/blogs/stuxnet-using-three-additional-
zero-day-vulnerabilities, September 2010.
[367] Symantec Official Blog. Top 5 security predictions for 2013 from symantec. Inter-
net. http://www.symantec.com/connect/blogs/top-5-security-predictions-2013-
symantec-0, 2012.
[368] P. Szr. The Art of Computer Virus Research and Defense. Addison-Wesley Professional,
February 2005.
[369] S. Tang, H. Mai, and S. King. Trust and Protection in the Illinois Browser Operating System.
In Proceedings of the 10th USENIX conference on Operating Systems Design and Implementation
(OSDI). USENIX, 2010.
182
Bibliography
[370] T. Telegraph. Bogus ap tweet about explosion at the white house wipes billions off us
markets. http://www.telegraph.co.uk/finance/markets/10013768/Bogus-AP-tweet-
about-explosion-at-the-White-House-wipes-billions-off-US-markets.html.
[371] M. Ter Louw and V. Venkatakrishnan. Blueprint: Precise Browser-neutral Prevention of
Cross-site Scripting Attacks. In Proceedings of the 30th IEEE Symposium on Security & Privacy,
Oakland, CA, May 2009.
[372] The Honeynet Project. Droidbox. https://code.google.com/p/droidbox/.
[373] The SysSec Consortium. Deliverable D7.1: Review of the state-of-the-art in cyberattacks,
June 2011.
[374] K. Theocharoulis, I. Papaefstathiou, and C. Manifavas. Implementing rainbow tables in
high-end fpgas for super-fast password cracking. In Proceedings of the 2010 International
Conference on Field Programmable Logic and Applications, pages 145150, 2010.
[375] K. Thomas, C. Grier, and V. Paxson. Adapting social spam infrastructure for political
censorship. In Proceedings of the USENIX Workshop on Large-Scale Exploits and Emergent
Threats (LEET), 2012.
[376] O. Thonnard, L. Bilge, G. OGorman, S. Kiernan, and M. Lee. Industrial espionage and
targeted attacks: understanding the characteristics of an escalating threat. In RAID12:
Proceedings of the 15th international conference on Research in Attacks, Intrusions, and Defenses.
Springer-Verlag, Sept. 2012.
[377] Tim Rains - Microsoft. Using the past to predict the future: Top 5 threat predictions for
2013. Internet. http://blogs.technet.com/b/security/archive/2012/12/13/using-
the-past-to-predict-the-future-top-5-threat-predictions-for-2013.aspx?
Redirected=true, 2012.
[378] V. Toubiana, A. Narayanan, D. Boneh, H. Nissenbaum, and S. Barocas. Adnostic: Privacy
preserving targeted advertising. In Proceedings of the 17th Network and Distributed System
Security Symposium, 2010.
[379] N. Tran, B. Min, J. Li, and L. Subramanian. Sybil-resilient online content voting. In
Proceedings of the 6th USENIX symposium on Networked systems design and implementation,
pages 1528, 2009.
[380] C.-Y. Tseng and M.-S. Chen. Incremental SVM Model for Spam Detection on Dynamic Email
Social Networks. 2009 International Conference on Computational Science and Engineering,
pages 128135, 2009.
[381] K.-Y. Tseng, D. Chen, Z. Kalbarczyk, and R. K. Iyer. Characterization of the error resiliency
of power grid substation devices. In International Conference on Dependable Systems and
Networks. IEEE Computer Society, June 2012.
[382] V. van der Veen, N. dutt Sharma, L. Cavallaro, and H. Bos. Memory Errors: The Past, the
Present, and the Future. In In Proceedings of the 15th International Symposium on Research in
Attacks Intrusions and Defenses (RAID), September 2012.
[383] R. Vigo. The Cyber-Physical Attacker. In dl.acm.org, pages 347356. Springer Berlin
Heidelberg, Berlin, Heidelberg, 2012.
[384] B. Viswanath, M. Mondal, K. P. Gummadi, A. Mislove, and A. Post. Canal: scaling social
network-based Sybil tolerance schemes. In Proceedings of the 7th ACM european conference on
Computer Systems - EuroSys 12, page 309. ACM Press, 2012.
[385] B. Viswanath, A. Post, K. P. Gummadi, and A. Mislove. An Analysis of Social Network-
Based Sybil Defenses. In Proceedings of the ACM SIGCOMM 2010 conference, page 363, New
York, New York, USA, 2010. ACM Press.
[386] P. Vreugdenhil. Pwn2Own 2010 Windows 7 Internet Explorer 8 exploit. http://
vreugdenhilresearch.nl/Pwn2Own-2010-Windows7-InternetExplorer8.pdf.
183
Bibliography
[387] D. Wagner, J. S. Foster, E. A. Brewer, and A. Aiken. A first step towards automated
detection of buffer overrun vulnerabilities. In Proceedings of the Network and Distributed
Systems Security Symposium (NDSS), 2000.
[388] D. Wang, L. Kaplan, H. Le, and T. Abdelzaher. On truth discovery in social sensing. In
Proceedings of the 11th international conference on Information Processing in Sensor Networks -
IPSN 12, page 233. ACM Press, 2012.
[389] H. J. Wang, X. Fan, J. Howell, and C. Jackson. Protection and Communication Abstractions
for Web Browsers in MashupOS. In T. C. Bressoud and M. F. Kaashoek, editors, SOSP,
pages 116. ACM, 2007.
[390] H. J. Wang, C. Grier, A. Moshchuk, S. T. King, P. Choudhury, and H. Venter. The Multi-
Principal OS Construction of the Gazelle Web Browser. In Proceedings of the 18th USENIX
Security Symposium, Montreal, Canada, August 2009.
[391] R. Wang, S. Chen, and X. Wang. Signing me onto your accounts through facebook and
google: A traffic-guided security study of commercially deployed single-sign-on web
services. In Proceedings of the 2012 IEEE Symposium on Security and Privacy, SP 12, pages
365379, Washington, DC, USA, 2012. IEEE Computer Society.
[392] W. Wang and Z. Lu. Cyber security in the Smart Grid: Survey and challenges. Computer
Networks, Jan. 2013.
[393] Websense. 2013 threat report. Internet. http://www.websense.com/content/websense-
2013-threat-report.aspx?intcmp=hp-promo-pod-en-2013-threat-report-
preorder, 2012.
[394] WEF. Global Risk 2012 Report. Seventh Edition. Technical report, World Economic Forum -
WEF, 2012.
[395] D. Wei, Y. Lu, M. Jafari, P. M. Skare, and K. S. G. I. T. o. Rohde. Protecting Smart Grid
Automation Systems Against Cyberattacks. Smart Grid, IEEE Transactions on, 2(4), 2011.
[396] M. Weir, S. Aggarwal, M. Collins, and H. Stern. Testing metrics for password creation
policies by attacking large sets of revealed passwords. In Proceedings of the 17th ACM
conference on Computer and communications security, CCS 10, pages 162175, New York, NY,
USA, 2010. ACM.
[397] T. Werner. Botnet Shutdown Success Story: How Kaspersky Lab Disabled the Hlux/Kelihos
Botnet, 2011. Technical Report: http://www.securelist.com/en/blog/208193137/.
[398] K. Wilhoit. Whos Really Attacking Your ICS Equipment? pages 118, Mar. 2013.
[399] H. Wimberly and L. M. Liebrock. Using fingerprint authentication to reduce system
security: An empirical study. In Proceedings of the 2011 IEEE Symposium on Security and
Privacy, pages 3246, 2011.
[400] J. Wyke. ZeroAccess, 2012. Technical Report by SophosLabs.
[401] L. Xu, F. Sun, and Z. Su. Constructing precise control flow graphs from binaries. Technical
report, Department of Computer Science, UC Davis, 2009.
[402] R. Xu, H. Sadi, and R. Anderson. Aurasium: Practical policy enforcement for android
applications. In Proc. of USENIX Security, 2012.
[403] G. Yan, S. Chen, and S. Eidenbenz. RatBot: Anti-enumeration Peer-to-Peer Botnets. In
Lecture Notes in Computer Science, vol. 7001, 2011.
[404] G. Yan, D. T. Ha, and S. Eidenbenz. AntBot: Anti-Pollution Peer-to-Peer Botnets. In Journal
of Computer Networks, vol. 55, 2011.
[405] L.-K. Yan and H. Yin. DroidScope: Seamlessly Reconstructing OS and Dalvik Semantic
Views for Dynamic Android Malware Analysis. In Proc. of USENIX Security, 2012.
[406] C. Yang, R. Harkreader, J. Zhang, S. Shin, and G. Gu. Analyzing spammers social networks
for fun and profit. In Proceedings of the 21st international conference on World Wide Web -
WWW 12, page 71. ACM Press, 2012.
184
Bibliography
[407] W. Yang, N. Li, Y. Qi, W. Qardaji, S. McLaughlin, and P. McDaniel. Minimizing private
data disclosures in the smart grid. In ACM conference on Computer and Communications
Security. ACM Request Permissions, Oct. 2012.
[408] Z. Yang, C. Wilson, X. Wang, T. Gao, B. Y. Zhao, and Y. Dai. Uncovering social network
sybils in the wild. Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement
conference - IMC 11, page 259, 2011.
[409] T.-F. Yen and M. K. Reiter. Revisiting Botnet Models and Their Implications for Takedown
Strategies. In Proceedings of the 1st Conference on Principles of Security and Trust, 2012.
[410] H. Yu, P. B. Gibbons, M. Kaminsky, and F. Xiao. SybilLimit: A Near-Optimal Social
Network Defense against Sybil Attacks. In 2008 IEEE Symposium on Security and Privacy (sp
2008), number Figure 1, pages 317. IEEE, May 2008.
[411] H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman. SybilGuard: Defending Against Sybil
Attacks via Social Networks. In Proceedings of the 2006 conference on Applications, technologies,
architectures, and protocols for computer communications - SIGCOMM 06, number September,
pages 267278, New York, New York, USA, 2006. ACM Press.
[412] S. Zanero and Z. Simic. Emergent phenomena testbed simulator for improving SCADA
performance in power system security management. Technical report, 2013.
[413] C. Zheng, S. Zhu, S. Dai, G. Gu, X. Gong, X. Han, and W. Zou. SmartDroid: an automatic
system for revealing UI-based trigger conditions in Android applications. In Proc. of SPSM,
2012.
[414] W. Zhou, Y. Zhou, X. Jiang, and P. Ning. Detecting repackaged smartphone applications in
third-party android marketplaces. In Proceedings of the second ACM conference on Data and
Application Security and Privacy (CODASPY), 2012.
[415] Y. Zhou and X. Jiang. Android Malware Genome Project. http://www.malgenomeproject.
org/.
[416] Y. Zhou and X. Jiang. Dissecting android malware: Characterization and evolution. In
Proc. of the IEEE Symposium on Security and Privacy, 2012.
[417] Y. Zhou, Z. Wang, W. Zhou, and X. Jiang. Hey, you, get off of my market: Detecting
malicious apps in official and alternative Android markets. In Proceedings of the 19th Annual
Network & Distributed System Security Symposium, Feb. 2012.
[418] T. Zimmermann, N. Nagappan, and L. Williams. Searching for a Needle in a Haystack:
Predicting Security Vulnerabilities for Windows Vista. In Proc. of the 3rd International
Conference on Software Testing, Verification and Validation, ICST10, Apr. 2010.
[419] M. Zuckerberg. Facebook across the web. http://www.facebook.com/blog/blog.php?
post=41735647130.
185
SEVENTH FRAMEWORK PROGRAMME
After the completion of its second year of operation, the SysSec Network of
Excellence produced this Red Book of Cybersecurity to serve as a roadmap
in the area of systems security. To realize this book, SysSec put together a Task
Force of top-level young researchers in the area, steered by the advice of
SysSec WorkPackage Leaders. The Task Force had vibrant consultations with
the Working Groups of SysSec, the Associated members of SysSec, and the
broader Systems Security Community. Capturing their feedback in an on-line
questionnaire and in forward-looking what if questions, the Task Force
distilled their knowledge, their concerns, and their vision for the future.
The result of this consultation has been captured in this book, which we hope
will serve as a roadmap of systems security research, and as an advisory
document for policy makers and researchers who would like to have an
impact on the security of the future Internet.