Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Theft-as-a-Service: Blocking the Cybercrime Market

timothy posted about 10 months ago | from the disrupting-virtual-gait-analysis dept.

Security 24

Nerval's Lobster writes "The same layers of virtualization that have made networked business computing so much more convenient and useful have also given bad guys much easier access to both physical and virtual servers within previously-secure datacenters. A group of engineering researchers from MIT has demonstrated one approach to making secure servers harder to access using a physical system that prevents attackers from reading a server's memory-access patterns to figure out where and how data are stored. Ascend, which the group demonstrated at a meeting of the International Symposium on Computer Architecture in Tel Aviv in June (PDF), is designed to obscure both memory-access patterns and the length of time specific computations take to keep attackers from learning enough to compromise the server. The approach goes beyond simply encrypting everything on the whole server to try to shut off one of the most direct ways attackers can address the server directly — whether the server is an air-gapped high-security machine sitting in an alarmed and guarded room at the NSA or a departmental server whose security settings are a little too loose. Other ways to try to obscure memory-access patterns were built as applications to run on the server. Ascend is the first time a hardware-only approach has been proposed, and the first to approach an acceptable level of performance, according to Srini Devadas, Edwin Sibley Webster Professor of Electrical Engineering and Computer Science, the MIT researcher who oversaw the team developing the hardware."

cancel ×
This is a preview of your comment

No Comment Title Entered

Anonymous Coward 1 minute ago

No Comment Entered


Great, another magic gun for hunting unicorns... (4, Insightful)

Shoten (260439) | about 10 months ago | (#44188317)

The overwhelming majority of breaches are not exotic. It's been shown that 85% of recent breaches would have been stopped by four fundamental security processes: patching, proper antimalware (both signature-based and whitelisting) and restriction of user access rights. Exotic hardware-based solutions to protect data in RAM do not help you when the application server itself has been compromised and the attacker has the same rights to the Oracle DB that your SAP instance has. I think it's great that people are working on defenses against these kinds of attacks, but the fact of the matter is that the way most organizations manage security, this is like getting vaccinated against Anthrax when you're a guy who rides a motorcycle drunk without a helmet every day. It's dealing with the wrong risk.

Re:Great, another magic gun for hunting unicorns.. (2)

CastrTroy (595695) | about 10 months ago | (#44188365)

Kind of this this Collapsible bike helmet [coroflot.com] made by a guy who rides a brakeless fixie in slip-on shoes. But what you say is really right. Most of the breaches are from just that, people getting remote desktop or SSH access to the servers. Weak passwords, services accessible directly from the internet, and other easily solvable problems means that this kind of stuff just shouldn't happen. But it still does on quite a regular basis.

Re:Great, another magic gun for hunting unicorns.. (1)

Sir or Madman (2818071) | about 10 months ago | (#44188407)

So, what, would you rather MIT's electrical engineers study the art of persuading lazy sys admins to keep things updated? You've like gone to a bbq and complain about the lack of veg options.

Re:Great, another magic gun for hunting unicorns.. (1)

Shoten (260439) | about 10 months ago | (#44188613)

So, what, would you rather MIT's electrical engineers study the art of persuading lazy sys admins to keep things updated? You've like gone to a bbq and complain about the lack of veg options.

I didn't go to the barbeque...the barbeque came to me. I'd rather MIT's engineers study ways to simplify the processes that are failing, rather than invent entirely new ones that don't solve the current problem as it exists. Yes, I do believe that science should actually serve a needed function, in the end. I don't think that having a Ph.D. makes someone a unique and special snowflake whose every effort is something we should cherish like a gift from God. They're framing this as practical science, meant to be applicable...but there's no problem to apply it to.

Re:Great, another magic gun for hunting unicorns.. (1)

icebike (68054) | about 10 months ago | (#44189753)

They're framing this as practical science, meant to be applicable...but there's no problem to apply it to.

To be fair, they are framing it as a solution to the problem of running sensitive data and programs on untrusted (cloud) computers beyond one's immediate control.

That might make sense except they had to assume into existence some special hardware.

They had to postulate the existence custom processor. And they had to accept a 13.5 times greater execution time imposed by such a processor.

Where would this be used? I'm totally at a loss to speculate what kind or work load would justify (somehow) insuring that your untrusted computers contained said processor AND paying for 13 time the execution charges JUST so you could do the computation on an untrusted computer on some untrusted network.

They postulate sending encrypted data and programs to run on this computer in an untrusted network somewhere, in the hands of untrusted people.

If your computing load is that sensitive, buy a box, hire an armed guard to feed your trained pack of attack dogs, and put them in the rack room with instructions to kill. It would be cheaper.

Re:Great, another magic gun for hunting unicorns.. (1)

Shoten (260439) | about 10 months ago | (#44191723)

Several very good points...and in fact, those points are only the tip of the iceberg of why this solution makes no sense in that model. There are multiple security problems with multi-level security with cloud computing above and beyond what this would solve. And yes, I get the idea that maybe if all the problems are solved, cloud computing could be usable that way...except that nobody's *ever* solved the MLS challenge in a way that was usable. Trusted Solaris is as close as it got, and it was too hard to work with (and no longer exists). Even more salient, all of the requirements and regulations around security in computing, from DIACAP to PCI DSS to NERC CIP would forbid use of cloud computing in such a situation, even with this technology. The sensitive computing loads are themselves prohibited by law and other standards from being put in a mixed environment in the first place, so there's no real market.

Re:Great, another magic gun for hunting unicorns.. (-1)

Anonymous Coward | about 10 months ago | (#44188593)

first come, first served; rings true for insider-trading and source-code alike.
For example, if your professor (albeit a madman/thief) at the --Technion-- teaches you to add using even-numbers only, you wouldnt DETECT that he fiddled your exam results by deducting a single point.
Its kinda like string theory and blog thread development all mashup!
hey /. hows it going "unhiding" the 1st comment on this article, subject: "High-Technion Crime"?
if you re-up it, you could call it Technion "E" Crime!
signed, MaDMAn!
dont pass go

Re:Great, another magic gun for hunting unicorns.. (2)

mianne (965568) | about 10 months ago | (#44189245)

You are correct. The reason why you are correct is key though. You can keep everything up-to-date, and lock down systems as tight as you want. But as long as any user has legitimate access to the system; there are weak links in the chain. If a user has access to the internet or a phone, they're susceptible to social engineering attacks.Email or web in particular, exposes the company to spear phishing attacks. Access to I/O ports or removable media devices creates a potential attack vector. Heck even without users who aren't highly security conscious, any hardware is a potential trojan assuming you haven't fully examined the code in every ROM of every motherboard, peripheral, router, etc. Every piece of software is also susceptible to 0-day exploits.

So despite all best practices, there'll almost always be low-hanging fruit for attacks. Conversely, any system sufficiently locked down to make them impenetrable not just by script kiddies, but by organized criminal enterprises or by foreign or domestic surveillance would also make it pretty much impossible to get any work done. So while doing your best to enforce basic security measures is a good first step, delving into the arcane and esoteric to further secure systems is still necessary if you wish to stay afloat in the arms race of cybercrime.

Re:Great, another magic gun for hunting unicorns.. (1)

icebike (68054) | about 10 months ago | (#44189851)

Social Engineering and spear phishing attacks are easier to protect against than hand waving into existence a custom processor architecture installed in untrusted computers running on an untrusted cloud so that you could send encrypted data and programs to run there on.

In fact by simply limiting what each legitimate user can do to JUST those things needed to do their job, you can cut the vast majority of Social Engineering and spear phishing opportunities. After that, education of the user is all that is really required.

Because even if you postulate the existence of some secure computing facility with specialized processors to handle encrypted workload at enormous expense, you will still have the possibility of social engineering and spear phishing attacks. The difference is, you will be paying 13 times as much for your computing and have another whole organization against which social engineering and spear phishing attacks can be applied.

Adding more targets for Social Engineering and spear phishing attacks is exactly the wrong approach.

Re:Great, another magic gun for hunting unicorns.. (1)

kjs3 (601225) | about 10 months ago | (#44194857)

True. The vast majority of postmortems my team has done show the compromised server was "low hanging fruit", usually because of poor patching. I wait patiently for the day that IT Ops people learn that the bullshit "why patch the box, it's stable?" attitude is going to screw them in the end. I may not live that long, however.

You cant stop theft (0)

Anonymous Coward | about 10 months ago | (#44188325)

As long as there are people, you will have criminals.

Re:You cant stop theft (1)

gl4ss (559668) | about 10 months ago | (#44188355)

As long as there are people, you will have criminals.

but you can sell expensive countermeasures even after criminals are gone.

Re:You cant stop theft (-1)

Anonymous Coward | about 10 months ago | (#44188441)

Wheres the "High-Technion Crime" comment?
in terms of user-transparency, /. is meant to be at the cutting-edge........ if you cant stand the heat, dont cook the books!

High Technion Crime (-1)

Anonymous Coward | about 10 months ago | (#44188329)

C`mon /. yall know the israelis are the arch-villains when it comes to data! I heard their building a new underground-criminal network of tech-centers in israel under Zuckerburg, and Brin`s in like flynne!
1.2 Billion-shmillion for the navigation thingy last week?

timothy, you SHMUCK (0)

Anonymous Coward | about 10 months ago | (#44188485)

Title has nothing to do with the summary. WTF jose.

Giving up (1)

gmuslera (3436) | about 10 months ago | (#44188541)

You mean that somewhat some people outside your organization get inside the data center where you have your servers, and starts to do live forensics to extract data from them that can't be get from the network, instead of, i.e. just unplugging and taking the servers, or backups, or just valuable hardware that should be small and be around. That kind of access and motivation seems to go mainly to the data center personnel (following orders from govt agencies or not), or NSA/CIA/etc related people.

Then yes, probably the appropiate measure will be to put those servers in the NSA datacenters, that won't stop or slow down them getting the info, but at least reduce the mess they could accidentally cause.

Godzilla! (0)

Anonymous Coward | about 10 months ago | (#44188599)

Godzila: http://www.youtube.com/watch?v=ln8-Y-fIbqM

God says...

109:17 As he loved cursing, so let it come unto him: as he delighted
not in blessing, so let it be far from him.

109:18 As he clothed himself with cursing like as with his garment, so
let it come into his bowels like water, and like oil into his bones.

109:19 Let it be unto him as the garment which covereth him, and for a
girdle wherewith he is girded continually.

109:20 Let this be the reward of mine adversaries from the LORD, and
of them that speak evil against my soul.

109:21 But do thou for me, O GOD the Lord, for thy name's sake:
because thy mercy is good, deliver thou me.

109:22 For I am poor and needy, and my heart is wounded within me.

109:23 I am gone like the shadow when it declineth: I am tossed up and
down as the locust.

Re:Godzilla! (1)

Cenan (1892902) | about 10 months ago | (#44189155)

109:24 Thou shalst forevermore post religious drivel on tech sites, so says I, YOUR LORD

Theft-as-a-Service? (0)

Anonymous Coward | about 10 months ago | (#44188675)

Too lazy to RTFA, is this another whine about payroll taxes? Or did someone else cron a piece of the action for themselves each pay day?

RFrost pist (-1)

Anonymous Coward | about 10 months ago | (#44189435)


Special situation only (1)

Animats (122034) | about 10 months ago | (#44189441)

This is a solution to a very special problem - one program with cryptographic code running in a VM, and a hostile program running in the same VM. There are some crypto algorithms which can be broken if you can submit keys to them, and watch how long they run or what cache misses they make. This is very tough to do in the real world.

It also comes up for crypto modules which do DRM for content owners. There, an attacker can watch the signals and interfere with the operation of the crypto unit to slowly extract its internal keys. That's a real threat to DRM systems.

This isn't for general purpose computing.

Re:Special situation only (1)

manu0601 (2221348) | about 10 months ago | (#44192089)

Thank you for making that clear. Slashdot datacenter article failed to explain what problem they were going to fix.

wall street? (0)

Anonymous Coward | about 10 months ago | (#44189707)

am I the only one who read the subject & wondered if TFA was about the financial industry?

Check for New Comments
Slashdot Account

Need an Account?

Forgot your password?

Don't worry, we never post anything without your permission.

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>
Sign up for Slashdot Newsletters
Create a Slashdot Account