kth.sePublications KTH
Change search
Link to record
Permanent link

Direct link
Publications (10 of 39) Show all publications
Alshnakat, A., Ahmadian, A. M., Balliu, M., Guanciale, R. & Dam, M. (2025). Securing P4 Programs by Information Flow Control. In: Proceedings - 2025 IEEE 38th Computer Security Foundations Symposium, CSF 2025: . Paper presented at 38th IEEE Computer Security Foundations Symposium, CSF 2025, Santa Cruz, United States of America, June 16-20, 2025 (pp. 284-299). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Securing P4 Programs by Information Flow Control
Show others...
2025 (English)In: Proceedings - 2025 IEEE 38th Computer Security Foundations Symposium, CSF 2025, Institute of Electrical and Electronics Engineers (IEEE) , 2025, p. 284-299Conference paper, Published paper (Refereed)
Abstract [en]

Software-Defined Networking (SDN) has transformed network architectures by decoupling the control and data-planes, enabling fine-grained control over packet processing and forwarding. P4, a language designed for programming data-plane devices, allows developers to define custom packet processing behaviors directly on programmable network devices. This provides greater control over packet forwarding, inspection, and modification. However, the increased flexibility provided by P4 also brings significant security challenges, particularly in managing sensitive data and preventing information leakage within the data-plane. This paper presents a novel security type system for analyzing information flow in P4 programs that combines security types with interval analysis. The proposed type system allows the specification of security policies in terms of input and output packet bit fields rather than program variables. We formalize this type system and prove it sound, guaranteeing that well-typed programs satisfy noninterference. Our prototype implementation, TAP4S, is evaluated on several use cases, demonstrating its effectiveness in detecting security violations and information leakages.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2025
National Category
Computer Sciences Communication Systems
Identifiers
urn:nbn:se:kth:diva-370452 (URN)10.1109/CSF64896.2025.00031 (DOI)2-s2.0-105014733792 (Scopus ID)
Conference
38th IEEE Computer Security Foundations Symposium, CSF 2025, Santa Cruz, United States of America, June 16-20, 2025
Note

Part of ISBN 9798331510817

QC 20250930

Available from: 2025-09-30 Created: 2025-09-30 Last updated: 2025-09-30Bibliographically approved
Moazen, M., Paladi, N., Ahsan, A. J. & Balliu, M. (2025). TAPShield: Securing Trigger-Action Platforms against Strong Attackers. In: Proceedings - IEEE 10th European Symposium on Security and Privacy, Euro S and P 2025: . Paper presented at 10th IEEE European Symposium on Security and Privacy, Euro S and P 2025, Venice, Italy, June 30 - July 4, 2025 (pp. 60-77). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>TAPShield: Securing Trigger-Action Platforms against Strong Attackers
2025 (English)In: Proceedings - IEEE 10th European Symposium on Security and Privacy, Euro S and P 2025, Institute of Electrical and Electronics Engineers (IEEE) , 2025, p. 60-77Conference paper, Published paper (Refereed)
Abstract [en]

Automation apps enable seamless connection of IoT devices and services to provide useful functionality for end-users. Apps are typically executed on cloud-based Trigger-Action Platforms (TAPs) such as IFTTT and Node-RED, supporting both single- and multi-tenant models. Such models raise security and privacy concerns in the face of cloud attackers and malicious app makers, resulting in massive and uncontrolled exfiltration of sensitive user data.To address these concerns, we design TAPShield, an architecture that uses confidential computing and language-level sandboxing to protect user data against untrustworthy TAPs and malicious apps. TAPShield targets JavaScript-driven TAPs built on the Node.js environment and uses trusted execution environments implemented with Intel SGX to protect against cloud attackers. It further uses language-level sandboxes such as vm2 and SandTrap to protect against malicious apps. We implement TAPShield for two popular TAPs, Node-RED and IFTTT, and report on the security, performance, and compatibility trade-offs on a range of real-world apps. Our results show clear security benefits with acceptable performance overhead, while adhering to existing development practices of production-scale TAPs.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2025
Keywords
Confidential Computing, Language-Level Sandboxing, Trigger-Action Platform
National Category
Computer Sciences Computer Systems Communication Systems
Identifiers
urn:nbn:se:kth:diva-370776 (URN)10.1109/EuroSP63326.2025.00013 (DOI)2-s2.0-105016187467 (Scopus ID)
Conference
10th IEEE European Symposium on Security and Privacy, Euro S and P 2025, Venice, Italy, June 30 - July 4, 2025
Note

Part of ISBN 9798331594930

QC 20251001

Available from: 2025-10-01 Created: 2025-10-01 Last updated: 2025-10-01Bibliographically approved
Birgersson, M., Artho, C. & Balliu, M. (2025). Trust and Verify: Formally Verified and Upgradable Trusted Functions. In: Proceedings - 2025 IEEE International Conference on Software Maintenance and Evolution, ICSME 2025: . Paper presented at 41st IEEE International Conference on Software Maintenance and Evolution, ICSME 2025, Auckland, New Zealand, September 7-12, 2025 (pp. 356-367). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Trust and Verify: Formally Verified and Upgradable Trusted Functions
2025 (English)In: Proceedings - 2025 IEEE International Conference on Software Maintenance and Evolution, ICSME 2025, Institute of Electrical and Electronics Engineers (IEEE) , 2025, p. 356-367Conference paper, Published paper (Refereed)
Abstract [en]

Computation over sensitive data requires that the computation function is secure and trusted. Existing approaches either do not enforce formal verification, require the user to verify the proof, or lack secure attestation guarantees. In addition, neither addresses the issue of having users once again inspect the application after upgrading the code running in the enclave. We propose an approach that uses a formal specification to guarantee that the behavior of the computation function conforms to the desired functionality. By combining automated verification with attestation on a trusted execution environment, we ensure that only conformant applications are executed. At the same time, we allow updates of the computation function without changing the attestation response, as long as the formal specification still holds. We implement and evaluate the system on several functions; our results show an average overhead of only 50 %. Finally, we demonstrate the validity of the system using a real-world application, Dafny-EVM.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2025
Keywords
confidential computation, formal verification, secure multi-party computation, trusted execution environments
National Category
Computer Sciences Computer Systems
Identifiers
urn:nbn:se:kth:diva-373856 (URN)10.1109/ICSME64153.2025.00040 (DOI)2-s2.0-105022433284 (Scopus ID)
Conference
41st IEEE International Conference on Software Maintenance and Evolution, ICSME 2025, Auckland, New Zealand, September 7-12, 2025
Note

Part of ISBN 9798331595876

QC 20251211

Available from: 2025-12-11 Created: 2025-12-11 Last updated: 2025-12-11Bibliographically approved
Aghvamipanah, M., Amini, M., Artho, C. & Balliu, M. (2024). Activity Recognition Protection for IoT Trigger-Action Platforms. In: Proceedings - 9th IEEE European Symposium on Security and Privacy, Euro S and P 2024: . Paper presented at 9th IEEE European Symposium on Security and Privacy, Euro S and P 2024, July 8-12, 2024, Vienna, Austria (pp. 600-616). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Activity Recognition Protection for IoT Trigger-Action Platforms
2024 (English)In: Proceedings - 9th IEEE European Symposium on Security and Privacy, Euro S and P 2024, Institute of Electrical and Electronics Engineers (IEEE) , 2024, p. 600-616Conference paper, Published paper (Refereed)
Abstract [en]

Smart home devices collect and transmit user data to smart home Trigger Action Platforms (TAPs) for processing and executing automation rules. However, this data can also be used to infer user activities or other sensitive information. In this paper, we propose PTAP, a privacy-preserving approach based on adversarial example attacks. PTAP injects targeted perturbations into time-series sensor data, effectively confounding potentially malicious TAP classifiers. Our approach significantly reduces the chance of user activity recognition for a malicious TAP while preserving the essential information for automation rule execution, thus safeguarding TAP utility. We evaluated PTAP using a real-world smart-home dataset and examined its effectiveness in preserving utility through the execution of various IoT applications. Our results demonstrate that PTAP effectively preserves user privacy (reducing the accuracy of a malicious classifier 91 to 6 percent) while maintaining automation rule integrity, providing a practical and effective solution to protect user privacy in smart-home environments.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2024
Keywords
Activity recognition, Adversarial example, Data perturbation, Data privacy, Smart home, Trigger Action platform
National Category
Computer Sciences Communication Systems Computer Systems
Identifiers
urn:nbn:se:kth:diva-353964 (URN)10.1109/EuroSP60621.2024.00039 (DOI)001304430300031 ()2-s2.0-85203675884 (Scopus ID)
Conference
9th IEEE European Symposium on Security and Privacy, Euro S and P 2024, July 8-12, 2024, Vienna, Austria
Note

Part of ISBN 9798350354256

QC 20241106

Available from: 2024-09-25 Created: 2024-09-25 Last updated: 2024-11-06Bibliographically approved
Ahmadian, A. M., Soloviev, M. & Balliu, M. (2024). Disjunctive Policies for Database-Backed Programs. In: 2024 IEEE 37TH Computer Security Foundations Symposium, CSF 2024: . Paper presented at 37th IEEE Computer Security Foundations Symposium (CSF), JUL 08-12, 2024, Enschede, NETHERLANDS (pp. 388-402). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Disjunctive Policies for Database-Backed Programs
2024 (English)In: 2024 IEEE 37TH Computer Security Foundations Symposium, CSF 2024, Institute of Electrical and Electronics Engineers (IEEE) , 2024, p. 388-402Conference paper, Published paper (Refereed)
Abstract [en]

When specifying security policies for databases, it is often natural to formulate disjunctive dependencies, where a piece of information may depend on at most one of two dependencies P-1 or P-2, but not both. A formal semantic model of such disjunctive dependencies, the Quantale of Information, was recently introduced by Hunt and Sands as a generalization of the Lattice of Information. In this paper, we seek to contribute to the understanding of disjunctive dependencies in database-backed programs and introduce a practical framework to statically enforce disjunctive security policies. To that end, we introduce the Determinacy Quantale, a new query-based structure which captures the ordering of disjunctive information in databases. This structure can be understood as a query-based counterpart to the Quantale of Information. Based on this structure, we design a sound enforcement mechanism to check disjunctive policies for database-backed programs. This mechanism is based on a type-based analysis for a simple imperative language with database queries, which is precise enough to accommodate a variety of row- and column-level database policies flexibly while keeping track of disjunctions due to control flow. We validate our mechanism by implementing it in a tool, DIVERT, and demonstrate its feasibility on a number of use cases.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2024
Series
Proceedings IEEE Computer Security Foundations Symposium, ISSN 1940-1434
National Category
Computer Sciences Computer Systems
Identifiers
urn:nbn:se:kth:diva-356018 (URN)10.1109/CSF61375.2024.00017 (DOI)001322679500026 ()2-s2.0-85205942253 (Scopus ID)
Conference
37th IEEE Computer Security Foundations Symposium (CSF), JUL 08-12, 2024, Enschede, NETHERLANDS
Note

Part of ISBN 979-8-3503-6204-6, 979-8-3503-6203-9

QC 20241111

Available from: 2024-11-11 Created: 2024-11-11 Last updated: 2025-02-14Bibliographically approved
Cornelissen, E., Shcherbakov, M. & Balliu, M. (2024). GHunter: Universal Prototype Pollution Gadgets in JavaScript Runtimes. In: Proceedings of the 33rd USENIX Security Symposium: . Paper presented at 33rd USENIX Security Symposium, August 14-16, 2024, Philadelphia, PA, USA. (pp. 3693-3710). USENIX - The Advanced Computing Systems Association
Open this publication in new window or tab >>GHunter: Universal Prototype Pollution Gadgets in JavaScript Runtimes
2024 (English)In: Proceedings of the 33rd USENIX Security Symposium, USENIX - The Advanced Computing Systems Association, 2024, p. 3693-3710Conference paper, Published paper (Refereed)
Abstract [en]

Prototype pollution is a recent vulnerability that affects JavaScript code, leading to high impact attacks such as arbitrary code execution and privilege escalation. The vulnerability is rooted in JavaScript's prototype-based inheritance, enabling attackers to inject arbitrary properties into an object's prototype at runtime. The impact of prototype pollution depends on the existence of otherwise benign pieces of code (gadgets), which inadvertently read from these attacker-controlled properties to execute security-sensitive operations. While prior works primarily study gadgets in third-party libraries and client-side applications, gadgets in JavaScript runtime environments are arguably more impactful as they affect any application that executes on these runtimes.

In this paper we design, implement, and evaluate a pipeline, GHunter, to systematically detect gadgets in V8-based JavaScript runtimes with prime focus on Node.js and Deno. GHunter supports a lightweight dynamic taint analysis to automatically identify gadget candidates which we validate manually to derive proof-of-concept exploits. We implement GHunter by modifying the V8 engine and the targeted runtimes along with features for facilitating manual validation. Driven by the comprehensive test suites of Node.js and Deno, we use GHunter in a systematic study of gadgets in these runtimes. We identified a total of 56 new gadgets in Node.js and 67 gadgets in Deno, pertaining to vulnerabilities such as arbitrary code execution (19), privilege escalation (31), path traversal (13), and more. Moreover, we systematize, for the first time, existing mitigations for prototype pollution and gadgets in terms of development guidelines. We collect a list of vulnerable applications and revisit the fixes through the lens of our guidelines. Through this exercise, we also identified one high-severity CVE leading to remote code execution, which was due to incorrectly fixing a gadget.

Place, publisher, year, edition, pages
USENIX - The Advanced Computing Systems Association, 2024
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kth:diva-354769 (URN)
Conference
33rd USENIX Security Symposium, August 14-16, 2024, Philadelphia, PA, USA.
Note

QC 20241014

Part of ISBN 978-1-939133-44-1

Available from: 2024-10-13 Created: 2024-10-13 Last updated: 2024-11-26Bibliographically approved
Cornelissen, E., Shcherbakov, M. & Balliu, M. (2024). GHUNTER: Universal Prototype Pollution Gadgets in JavaScript Runtimes. In: PROCEEDINGS OF THE 33RD USENIX SECURITY SYMPOSIUM, SECURITY 2024: . Paper presented at 33rd USENIX Security Symposium, AUG 14-16, 2024, Philadelphia, PA (pp. 3693-3710). USENIX ASSOC
Open this publication in new window or tab >>GHUNTER: Universal Prototype Pollution Gadgets in JavaScript Runtimes
2024 (English)In: PROCEEDINGS OF THE 33RD USENIX SECURITY SYMPOSIUM, SECURITY 2024, USENIX ASSOC , 2024, p. 3693-3710Conference paper, Published paper (Refereed)
Abstract [en]

Prototype pollution is a recent vulnerability that affects JavaScript code, leading to high impact attacks such as arbitrary code execution and privilege escalation. The vulnerability is rooted in JavaScript's prototype-based inheritance, enabling attackers to inject arbitrary properties into an object's prototype at runtime. The impact of prototype pollution depends on the existence of otherwise benign pieces of code (gadgets), which inadvertently read from these attacker-controlled properties to execute security-sensitive operations. While prior works primarily study gadgets in third-party libraries and client-side applications, gadgets in JavaScript runtime environments are arguably more impactful as they affect any application that executes on these runtimes. In this paper we design, implement, and evaluate a pipeline, GHUNTER, to systematically detect gadgets in V8-based JavaScript runtimes with prime focus on Node.js and Deno. GHUNTER supports a lightweight dynamic taint analysis to automatically identify gadget candidates which we validate manually to derive proof-of-concept exploits. We implement GHUNTER by modifying the V8 engine and the targeted runtimes along with features for facilitating manual validation. Driven by the comprehensive test suites of Node.js and Deno, we use GHUNTER in a systematic study of gadgets in these runtimes. We identified a total of 56 new gadgets in Node.js and 67 gadgets in Deno, pertaining to vulnerabilities such as arbitrary code execution (19), privilege escalation (31), path traversal (13), and more. Moreover, we systematize, for the first time, existing mitigations for prototype pollution and gadgets in terms of development guidelines. We collect a list of vulnerable applications and revisit the fixes through the lens of our guidelines. Through this exercise, we also identified one high-severity CVE leading to remote code execution, which was due to incorrectly fixing a gadget.

Place, publisher, year, edition, pages
USENIX ASSOC, 2024
National Category
Computer Sciences
Identifiers
urn:nbn:se:kth:diva-360730 (URN)001333860304022 ()
Conference
33rd USENIX Security Symposium, AUG 14-16, 2024, Philadelphia, PA
Note

Part of ISBN 978-1-939133-44-1

QC 20250303

Available from: 2025-03-03 Created: 2025-03-03 Last updated: 2025-03-03Bibliographically approved
Cornelissen, E., Shcherbakov, M. & Balliu, M. (2024). GHUNTER: Universal Prototype Pollution Gadgets in JavaScript Runtimes. In: Proceedings of the 33rd USENIX Security Symposium: . Paper presented at 33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, United States of America, Aug 14 2024 - Aug 16 2024 (pp. 3693-3710). USENIX Association
Open this publication in new window or tab >>GHUNTER: Universal Prototype Pollution Gadgets in JavaScript Runtimes
2024 (English)In: Proceedings of the 33rd USENIX Security Symposium, USENIX Association , 2024, p. 3693-3710Conference paper, Published paper (Refereed)
Abstract [en]

Prototype pollution is a recent vulnerability that affects JavaScript code, leading to high impact attacks such as arbitrary code execution and privilege escalation. The vulnerability is rooted in JavaScript's prototype-based inheritance, enabling attackers to inject arbitrary properties into an object's prototype at runtime. The impact of prototype pollution depends on the existence of otherwise benign pieces of code (gadgets), which inadvertently read from these attacker-controlled properties to execute security-sensitive operations. While prior works primarily study gadgets in third-party libraries and client-side applications, gadgets in JavaScript runtime environments are arguably more impactful as they affect any application that executes on these runtimes. In this paper we design, implement, and evaluate a pipeline, GHUNTER, to systematically detect gadgets in V8-based JavaScript runtimes with prime focus on Node.js and Deno. GHUNTER supports a lightweight dynamic taint analysis to automatically identify gadget candidates which we validate manually to derive proof-of-concept exploits. We implement GHUNTER by modifying the V8 engine and the targeted runtimes along with features for facilitating manual validation. Driven by the comprehensive test suites of Node.js and Deno, we use GHUNTER in a systematic study of gadgets in these runtimes. We identified a total of 56 new gadgets in Node.js and 67 gadgets in Deno, pertaining to vulnerabilities such as arbitrary code execution (19), privilege escalation (31), path traversal (13), and more. Moreover, we systematize, for the first time, existing mitigations for prototype pollution and gadgets in terms of development guidelines. We collect a list of vulnerable applications and revisit the fixes through the lens of our guidelines. Through this exercise, we also identified one high-severity CVE leading to remote code execution, which was due to incorrectly fixing a gadget.

Place, publisher, year, edition, pages
USENIX Association, 2024
National Category
Computer Sciences Software Engineering
Identifiers
urn:nbn:se:kth:diva-367284 (URN)2-s2.0-85204997409 (Scopus ID)
Conference
33rd USENIX Security Symposium, USENIX Security 2024, Philadelphia, United States of America, Aug 14 2024 - Aug 16 2024
Note

Part of ISBN 9798350359312

QC 20250717

Available from: 2025-07-17 Created: 2025-07-17 Last updated: 2025-07-17Bibliographically approved
Soloviev, M., Balliu, M. & Guanciale, R. (2024). Security Properties through the Lens of Modal Logic. In: 2024 IEEE 37th computer security foundations symposium, CSF 2024: . Paper presented at 37th IEEE Computer Security Foundations Symposium (CSF), JUL 08-12, 2024, Enschede, NETHERLANDS (pp. 340-355). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Security Properties through the Lens of Modal Logic
2024 (English)In: 2024 IEEE 37th computer security foundations symposium, CSF 2024, Institute of Electrical and Electronics Engineers (IEEE) , 2024, p. 340-355Conference paper, Published paper (Refereed)
Abstract [en]

We introduce a framework for reasoning about the security of computer systems using modal logic. This framework is sufficiently expressive to capture a variety of known security properties, while also being intuitive and independent of syntactic details and enforcement mechanisms. We show how to use our formalism to represent various progress- and termination-(in)sensitive variants of confidentiality, integrity, robust declassification and transparent endorsement, and prove equivalence to standard definitions. The intuitive nature and closeness to semantic reality of our approach allows us to make explicit several hidden assumptions of these definitions, and identify potential issues and subtleties with them, while also holding the promise of formulating cleaner versions and future extension to entirely novel properties.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2024
Series
Proceedings IEEE Computer Security Foundations Symposium, ISSN 1940-1434
National Category
Computer Sciences
Identifiers
urn:nbn:se:kth:diva-356024 (URN)10.1109/CSF61375.2024.00009 (DOI)001322679500023 ()2-s2.0-85205990384 (Scopus ID)
Conference
37th IEEE Computer Security Foundations Symposium (CSF), JUL 08-12, 2024, Enschede, NETHERLANDS
Note

Part of ISBN 979-8-3503-6204-6, 979-8-3503-6203-9

QC 20241111

Available from: 2024-11-11 Created: 2024-11-11 Last updated: 2024-11-11Bibliographically approved
Birgersson, M., Artho, C. & Balliu, M. (2024). Sharing without Showing: Secure Cloud Analytics with Trusted Execution Environments. In: Proceedings - 2024 IEEE Secure Development Conference, SecDev 2024: . Paper presented at 2024 IEEE Secure Development Conference, SecDev 2024, Pittsburgh, United States of America, Oct 7 2024 - Oct 9 2024 (pp. 105-116). Institute of Electrical and Electronics Engineers (IEEE)
Open this publication in new window or tab >>Sharing without Showing: Secure Cloud Analytics with Trusted Execution Environments
2024 (English)In: Proceedings - 2024 IEEE Secure Development Conference, SecDev 2024, Institute of Electrical and Electronics Engineers (IEEE) , 2024, p. 105-116Conference paper, Published paper (Refereed)
Abstract [en]

Many applications benefit from computations over the data of multiple users while preserving confidentiality. We present a solution where multiple mutually distrusting users' data can be aggregated with an acceptable overhead, while allowing users to be added to the system at any time without re-encrypting data. Our solution to this problem is to use a Trusted Execution Environment (Intel SGX) for the computation, while the confidential data is encrypted with the data owner's key and can be stored anywhere, without trust in the service provider. We do not require the user to be online during the computation phase and do not require a trusted party to store data in plain text. Still, the computation can only be carried out if the data owner explicitly has given permission.Experiments using common functions such as the sum, least square fit, histogram, and SVM classification, exhibit an average overhead of 1.6×. In addition to these performance experiments, we present a use case for computing the distributions of taxis in a city without revealing the position of any other taxi to the other parties.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2024
Keywords
Confidential computation, Multi-party computation, SGX, Trusted execution platform
National Category
Computer Sciences Other Computer and Information Science Computer Engineering
Identifiers
urn:nbn:se:kth:diva-357693 (URN)10.1109/SecDev61143.2024.00016 (DOI)001348939600011 ()2-s2.0-85210578964 (Scopus ID)
Conference
2024 IEEE Secure Development Conference, SecDev 2024, Pittsburgh, United States of America, Oct 7 2024 - Oct 9 2024
Note

Part of ISBN 979-8-3503-9193-0

QC 20241217

Available from: 2024-12-12 Created: 2024-12-12 Last updated: 2024-12-17Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0001-6005-5992

Search in DiVA

Show all publications