Abstract — Today, software errors are almost the only source of security vulnerabilities. Imagine a world without any software errors - would today's systems be safe and secure? Unfortunately not. With attacks that skip abstraction layers we can exploit effects rooted deeply in our hardware. This attack gives an overview of these attacks by discussing three concrete examples that have caught widespread media attention (Meltdown, Spectre, and Rowhammer). Finally, we will discuss how we got into this situation and what we can learn from it.
Biography — Daniel Gruss (@lavados) is an Assistant Professor at Graz University of Technology. He finished his PhD with distinction in less than 3 years. He has been involved in teaching operating system undergraduate courses since 2010. Daniel's research focuses on software-based side-channel attacks that exploit timing differences in hardware and operating systems. He implemented the first remote fault attack running in a website, known as Rowhammer.js. He frequently speaks at top international venues, such as Black Hat, Usenix Security, IEEE S&P, ACM CCS, Chaos Communication Congress, and others. His research team was one of the teams that found the Meltdown and Spectre bugs published in early 2018.
Abstract — Internet users have become reliant on a swathe of online services for everyday tasks and expect them to uphold service integrity. However, data loss or corruption can happen despite service providers' best efforts. In such cases, users often have little recourse, even struggling to prove that an integrity violation has occurred. In this talk, I will describe how to use Intel SGX for the auditing of online services. I will present LibSEAL, a SEcure Audit Library that creates a non-repudiable audit log of service operations and checks invariants to discover violations of service integrity. LibSEAL acts as a drop-in replacement for TLS libraries used by services, and runs inside an SGX enclave to protect the integrity of the audit log. Logs are stored using an embedded relational database, which permits service invariant violations to be discovered through simple SQL queries. We evaluate LibSEAL with three services (Git, ownCloud, and Dropbox) and demonstrate that it is effective in discovering integrity violations.
Biography — Peter Pietzuch is a Professor at Imperial College London, where he leads the Large-scale Data & Systems (LSDS) group in the Department of Computing. His research focuses on the design and engineering of scalable, reliable and secure software systems, with a particular interest in performance, data management and security issues. Before joining Imperial College London, he was a post-doctoral fellow at Harvard University. He holds PhD and MA degrees from the University of Cambridge.
|08:45–09:00||Opening and Welcome|
|How the Hardware undermines Software Security
Daniel Gruss, Graz University of Technology
|10:00-11:00||Session: Software Security|
|Configuration-Driven Software Debloating.
Hyungjoon Koo, Seyedhamed Ghavamnia, and Michalis Polychronakis (Stony Brook University)
|Pythia: Identifying Dangerous Data-flows in Django-based Applications.
Linos Giannopoulos, Eirini Degkleri (Greek Research and Technology Network), Panayiotis Tsanakas (National Technical University of Athens), and Dimitris Mitropoulos (Greek Research and Technology Network)
|Static Analysis of ROP Code.
Daniele Cono D'Elia, Emilio Coppa, Andrea Salvati, and Camil Demetrescu (Sapienza University of Rome)
|11:30-12:30||Session: Vulnerability Analysis|
|Security Analysis of Devolo HomePlug Devices.
Rouven Scholz and Christian Wressnegger (TU Braunschweig)
|Pitfalls of open architecture: How friends can exploit your cryptocurrency wallet.
Thanh Bui, Siddharth Prakash Rao (Aalto University), Markku Antikainen (University of Helsinki), and Tuomas Aura (Aalto University)
|Market Manipulation as a Security Problem: Attacks and Defenses.
Vasilios Mavroudis (University College London)
|Detecting Integrity Violations in Online Services Using Trusted Hardware
Peter Pietzuch, Imperial College London
|15:00-16:00||Session: Privacy and Communication|
|Is Privacy possible without Anonymity? The case for microblogging services.
Panagiotis Papadopoulos (FORTH-ICS), Antonis Papadogiannakis (ProtectWise), Michalis Polychronakis (Stony Brook University), and Evangelos P. Markatos (FORTH-ICS)
|Forward and Backward Private Searchable Encryption with Intel SGX.
Ghous Amjad, Seny Kamara, and Tarik Moataz (Brown University)
|T-IBE-T: Identity-Based Encryption for Inter-Tile Communication.
Alexander Würstlein and Wolfgang Schröder-Preikschat (Friedrich-Alexander-Universität Erlangen-Nürnberg)
The 12th European Workshop on Systems Security (EuroSec) aims to bring together researchers, practitioners, system administrators, system programmers, and others interested in the latest advances in the security of computer systems and networks. The objective of the workshop is to discuss novel, practical, systems-oriented work. The workshop will precede the EuroSys 2019 conference.
EuroSec encourages systems security researchers to share early iterations of bleeding-edge ideas with the community, before they are further developed into full papers. Reciprocally, authors receive feedback to help steer and improve their research to its full potential. Many EuroSec papers later form the basis for full conference papers presented at one of the top venues in computer security.
EuroSec seeks contributions on all aspects of systems security. Topics of interest include (but are not limited to):
In accordance with the spirit of EuroSys, we also seek:
You are invited to submit papers of up to 6 pages, with 9-point font, in a two-column format, including figures, tables and references. Submitted papers must use the 2017 ACM sigconf proceedings template. You should not modify key aspects of the template, such as font face, spacing, etc. The template, as well as instructions on how to use it, can be found here.
All submissions will be reviewed by the Program Committee. Only original, novel work will be considered for publication. Accepted papers will be published in the Proceedings of EuroSec in the ACM Digital Library. One author of each accepted paper is required to attend the workshop and present the paper for it to be included in the proceedings.
Submissions should be made online at https://eurosec2019.sec.tu-bs.de.