© 2020 Qi Wang SECURING EMERGING IOT SYSTEMS THROUGH SYSTEMATIC ANALYSIS and DESIGN

Total Page:16

File Type:pdf, Size:1020Kb

© 2020 Qi Wang SECURING EMERGING IOT SYSTEMS THROUGH SYSTEMATIC ANALYSIS and DESIGN © 2020 Qi Wang SECURING EMERGING IOT SYSTEMS THROUGH SYSTEMATIC ANALYSIS AND DESIGN BY QI WANG DISSERTATION Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Computer Science in the Graduate College of the University of Illinois at Urbana-Champaign, 2020 Urbana, Illinois Doctoral Committee: Professor Carl A. Gunter, Chair Professor Klara Nahrstedt Assistant Professor Adam Bates Assistant Professor Kangkook Jee, University of Texas at Dallas ABSTRACT The Internet of Things (IoT) is growing very rapidly. A variety of IoT systems have been developed and employed in many domains such as smart home, smart city and industrial control, providing great benefits to our everyday lives. However, as IoT becomes increasingly prevalent and complicated, it is also introducing new attack surfaces and security challenges. We are seeing numerous IoT attacks exploiting the vulnerabilities in IoT systems everyday. Security vulnerabilities may manifest at different layers of the IoT stack. There is no single security solution that can work for the whole ecosystem. In this dissertation, we explore the limitations of emerging IoT systems at different layers and develop techniques and systems to make them more secure. More specifically, we focus on three of the most important layers: the user rule layer, the application layer and the device layer. First, on the user rule layer, we characterize the potential vulnerabilities introduced by the interaction of user-defined automation rules. We introduce iRuler, a static analysis system that uses model checking to detect inter-rule vulnerabilities that exist within trigger-action platforms such as IFTTT in an IoT deployment. Second, on the application layer, we design and build ProvThings, a system that instruments IoT apps to generate data provenance that provides a holistic explanation of system activities, including malicious behaviors. Lastly, on the device layer, we develop ProvDetector and SplitBrain to detect malicious processes using kernel-level provenance tracking and analysis. ProvDetector is a centralized approach which collects all the audit data from the clients and performs detection on the server. SplitBrain extends ProvDetector with collaborative learning, where the clients collaboratively builds the detection model and performs detection on the client device. ii To my parents, for their love and support. & To my mother, I will love you forever. iii ACKNOWLEDGMENTS I would like to thank my advisor Professor Carl Gunter for his great supervision and guidance. Professor Gunter has provided me with enormous support and insightful advice during my Ph.D. study. He gave me a lot of freedom to explore the research problems that I find interesting. I am always feeling extremely fortunate and thankful to work with and learn from him. His kindness and wisdom have motivated and inspired me a lot through my Ph.D. study, and will continue to motivate me in the future. I would also like to extend my appreciation to the rest of my dissertation committee members, Professor Klara Nahrstedt, Assistant Professor Adam Bates and Assistant Pro- fessor Kangkook Jee, for their service and support. They have provided insightful feedback, suggestions and guidance to this dissertation. I would like to thank Adam Bates, one major collaborator for my IoT security research. It was fantastic to have the opportunity to work with him. I am thankful for his aspir- ing professional guidance, invaluable constructive criticism and positive attitude during my research work. With special mention to Kangkook Jee, my two-times NEC Laboratories America, Inc. (NEC Labs) internship mentor. I'm grateful that I had the opportunity of working with and learning from him. He helped me not only in research but also in life. I am fortunate to have such a friend. I would like to thank all my coauthors and collaborators during my Ph.D. study: pro- fessors Nikita Borisov, William H Sanders, Jos´eMeseguer, Indranil Gupta and Bo Li at University of Illinois at Urbana-Champaign (UIUC); researchers Haifeng Chen, Ding Li, Xiao Yu, Zhengzhang Chen, Wei Cheng and Junghwan Rhee from NEC labs; and my fellow students Xiaojun Xu, Huichen Li, Wajih Ul Hassan, Pubali Datta, Benjamin E Ujcich, Si Liu, Wei Yang and Karan Ganju. I apologize for any of the inevitable omissions. I am also very thankful to my lab mates and all my friends at UIUC and during internships for making my Ph.D. life enjoyable. Special thanks to Yi Zhang, Si Liu, Sihan Li, and Wei Yang. I am extremely grateful to my parents and sisters for supporting me through all these years. Their unconditional love and support helped me bring this adventure to its end. This dissertation is dedicated to them. iv TABLE OF CONTENTS CHAPTER 1 INTRODUCTION . 1 1.1 Thesis Statement . .2 1.2 Dissertation Contributions . .3 1.3 Dissertation Organization . .4 CHAPTER 2 PRELIMINARY CONCEPTS . 5 2.1 IoT Platforms and Smart Home Platforms . .5 2.2 Trigger-Action IoT Platforms . .7 2.3 The Growth and Risks of Highly Functional IoT Devices . .9 2.4 Data Provenance . .9 CHAPTER 3 UNDERSTANDING AND DISCOVERING INTER-RULE VUL- NERABILITIES . 11 3.1 Introduction . 11 3.2 Background . 13 3.3 Threat Model and Assumptions . 13 3.4 Characterization of Inter-Rule Vulnerabilities . 14 3.5 Approach: IRULER . 18 3.6 Evaluation . 23 3.7 Discussion and Limitations . 28 3.8 Related Work . 28 3.9 Conclusion . 30 CHAPTER 4 PROVIDING PROVENANCE TRACING TO IOT PLATFORMS . 31 4.1 Introduction . 31 4.2 Background . 33 4.3 Threat Model and Assumptions . 35 4.4 Approach: ProvThings . 36 4.5 Implementation . 43 4.6 Evaluation . 46 4.7 User Scenarios . 50 4.8 Discussion and Limitations . 57 4.9 Related Work . 58 4.10 Conclusion . 59 CHAPTER 5 DETECTING STEALTHY ATTACKS AGAINST DEVICES VIA DATA PROVENANCE ANALYSIS . 61 5.1 Introduction . 61 5.2 Background . 64 5.3 Threat Model and Assumptions . 69 v 5.4 Problem Definition . 69 5.5 Approach: ProvDetector ........................... 71 5.6 Evaluation . 77 5.7 Discussion and Limitations . 89 5.8 Related Work . 90 5.9 Conclusion . 93 CHAPTER 6 ENABLING ON-DEVICE ANOMALY DETECTION WITH FED- ERATED LEARNING . 94 6.1 Introduction . 94 6.2 Background . 97 6.3 Threat Model and Assumptions . 100 6.4 Approach: SplitBrain . 100 6.5 Evaluation . 107 6.6 Discussion . 111 6.7 Related Work . 112 6.8 Conclusion . 113 CHAPTER 7 FUTURE WORK AND CONCLUSION . 114 7.1 Future Work . 114 7.2 Concluding Remarks . 115 REFERENCES . 117 APPENDIX A EXAMPLE CODE IN IOT PLATFORMS . 138 A.1 IFTTT Applet Filter Code Example . 138 A.2 The Code Structure of an Example Device Handler . 138 APPENDIX B EXAMPLE DEVICE/SERVICE METADATA OF IRULER . 139 APPENDIX C SOURCE CODE OF SMARTAPPS USED IN PROVTHINGS CASE STUDIES . 141 C.1 Source Code of the LockItWhenILeave SmartApp . 141 C.2 Source Code of the FaceDoor SmartApp . 142 vi CHAPTER 1: INTRODUCTION The Internet of Things (IoT) is growing rapidly. The number of IoT devices deployed worldwide is expected to reach 20.4 billion by 2020, forming a global market of 13 trillion dollars [1]. The rapid expansion of IoT is providing great benefits to our everyday lives. For example, smart homes now offer the ability to automatically manage household appliances, while smart health initiatives have made monitoring more effective and adaptive for each patient. With the increasing of user requirements, IoT devices are becoming more complex. Voice assistants, smart-home hubs, wearables, drones, and automobiles are just some examples. Recent development of inexpensive and highly functional hardware [2, 3] has introduced cost- effective ways to implement IoT devices running community-verified IoT operating systems (e.g., Android Things [4] and Ubuntu IoT [5]). Leveraging existing full-fledged IoT operating systems (OSes), it saves a lot of time and efforts to build highly functional IoT devices to meet the growing and diversified computational demands. On the other hand, in response to the increasing availability of smart devices, a variety of IoT platforms have emerged that are able to interoperate with devices from different manufactures. Samsung's SmartThings [6], Apple's HomeKit [7], and Google's Android Things [4] are just a few examples. IoT plat- forms offer appified software [8] for the management of smart devices, with many going so far as to provide programming frameworks for the design of third-party applications. To sup- port easier end-user customizations, many IoT platforms provide user-friendly programming frameworks for the design of simple automation logic that enable customized functionality. For example, IFTTT [9] and Zapier [10]. Currently, trigger-action programming (TAP) is the most commonly-used model to create automations in IoT. Studies have shown that about 80% of the automation requirements of typical users can be represented by TAP and that even non-programmers can easily learn this paradigm [11]. However, as long prophesied by our community, the expansion of IoT is also now bringing about new challenges in terms of security and privacy. Recently, there are numerous IoT attacks exploit the vulnerabilities in IoT devices [12, 13, 14, 15, 16, 17], protocols [18, 19], apps and platforms [20]. In some cases, IoT attacks could have chilling safety consequences { burglars can now attack a smart door lock to break into homes [14], and arsonists may even attack a smart oven to cause a fire [21]. There are considerable challenges to protect IoT. First, new IoT devices are released and deployed every day. Exploits targeting IoT devices are also being developed by ad- versaries at a similarly high pace, making the threats against IoT devices highly dynamic 1 and ever-increasing. Second, Most IoT devices have limited resource allocations. It is thus a challenging task to build an effective host-based data collection and detection solution that runs on minimal resources.
Recommended publications
  • Chinese Folk Art, Festivals, and Symbolism in Everyday Life
    Chinese Folk Art, Festivals, and Symbolism in Everyday Life PHOEBE A. HEARST MUSEUM OF ANTHROPOLOGY Written and Designed by Nicole Mullen with contributions by Ching-chih Lin, PhD candidate, History Department, UC Berkeley. Additional contributors: Elisa Ho, Leslie Kwang, Jill Girard. Funded by the Berkeley East Asia National Resource Center through its Title VI grant from the U.S. Department of Education. Special thanks to Ching-chih Lin, for his extraordinary contributions to this teaching guide and the Taipei Economic and Cultural Office in San Francisco for its generous print and electronic media contributions. Editor: Ira Jacknis Copyright © 2005. Phoebe A. Hearst Museum of Anthropology and the Regents of the University of California. All rights reserved. 103 Kroeber Hall. #3712, Berkeley CA 94720 Cover image: papercut, lion dance performance, 9–15927c All images with captions followed by catalog numbers in this guide are from the collections of the Phoebe A. Hearst Museum of Anthropology. All PAHMA objects from Beijing and Nanking are from the museum's Ilse Martin Fang Chinese Folklore Collection. The collection was assembled primarily in Beijing between 1941 and 1946, while Ms. Fang was a postdoctoral fellow at the Deutschland Institute working in folklore and women's studies. PHOEBE A. HEARST MUSEUM OF ANTHROPOLOGY CHINA The People’s Republic of China is the third largest country in the world, after Russia and Canada. It is slightly larger than the United States and includes Hong Kong and Macau. China is located in East Asia. The capital city is Beijing, which is in the northeast part of the country.
    [Show full text]
  • Daily Life for the Common People of China, 1850 to 1950
    Daily Life for the Common People of China, 1850 to 1950 Ronald Suleski - 978-90-04-36103-4 Downloaded from Brill.com04/05/2019 09:12:12AM via free access China Studies published for the institute for chinese studies, university of oxford Edited by Micah Muscolino (University of Oxford) volume 39 The titles published in this series are listed at brill.com/chs Ronald Suleski - 978-90-04-36103-4 Downloaded from Brill.com04/05/2019 09:12:12AM via free access Ronald Suleski - 978-90-04-36103-4 Downloaded from Brill.com04/05/2019 09:12:12AM via free access Ronald Suleski - 978-90-04-36103-4 Downloaded from Brill.com04/05/2019 09:12:12AM via free access Daily Life for the Common People of China, 1850 to 1950 Understanding Chaoben Culture By Ronald Suleski leiden | boston Ronald Suleski - 978-90-04-36103-4 Downloaded from Brill.com04/05/2019 09:12:12AM via free access This is an open access title distributed under the terms of the prevailing cc-by-nc License at the time of publication, which permits any non-commercial use, distribution, and reproduction in any medium, provided the original author(s) and source are credited. An electronic version of this book is freely available, thanks to the support of libraries working with Knowledge Unlatched. More information about the initiative can be found at www.knowledgeunlatched.org. Cover Image: Chaoben Covers. Photo by author. Library of Congress Cataloging-in-Publication Data Names: Suleski, Ronald Stanley, author. Title: Daily life for the common people of China, 1850 to 1950 : understanding Chaoben culture / By Ronald Suleski.
    [Show full text]
  • The Dog As a Metaphor Or Symbol in Chinese Popular Phraseology
    ASIAN AND AFRICAN STUDIES, 16 , 2007, 2, 161-185 THE DOG AS A METAPHOR OR SYMBOL IN CHINESE POPULAR PHRASEOLOGY Henrieta HATALOVÁ Institute of Oriental Studies, Slovak Academy of Sciences, Klemensova 19, 813 64 Bratislava, Slovakia r itahatalo va@gmai 1. com The current article is an attempt to examine the Chinese popular phraselogy with dog motifs from the point of view of how Chinese proverbs and sayings make use of the motif mentioned as a/ a metaphor or b/ a phraseological symbol. Between the symbolics of the dog in Chinese traditional and popular culture there is sometimes a significant difference, the dog as a symbol in phraseology can be classified mainly as an ambivalent symbol, in spite of the prevailing positive symbolics in various areas of traditional culture. Key words: dog, animal, phraseology, symbolics, Chinese popular literature and culture The analysis of figurativeness of the dog motif in Chinese popular phraseological expressions -shuyu , mainly the genres ill ip- yanyu (proverbs, further as /yy/),fíBp- suyu (sayings and popular phrases, expressions or colloquial expressions, further as /sy/); ifc ip* xiehouyu (sayings or alternatively gnomic proverbs, or proverbs containing a riddle/ enigmatic folk similes or truncated witticisms) and in the part of fJcip- chengyu (further as /chy/) which became popular or widely understandable, denoted also as suchengyu (popular sayings or phrases).1 The basic file of these phraseological 1 With regard to the uncleamess when defining the individual categories of Chinese popular phraselogy f#ip- suyu or 5 suhua I decided to respect in my research the most recently works of PRC provenance - above all the collective monograph of WU Zhankun - MA Guofan Tí, 15 JT: Yanyu Ü ip- {Proverbs) and the recent monograph of WU Zhankun Ä : Zhonghua yenyao yanjiu T ^ üi i§ fjf % {Research o f ChineseProverbs and Popular Verses).
    [Show full text]
  • Isolation Mechanisms for High-Speed Packet-Processing Pipelines
    Isolation Mechanisms for High-Speed Packet-Processing Pipelines Tao Wang† Xiangrui Yang‡∗ Gianni Antichi⋆⋆ Anirudh Sivaraman† Aurojit Panda† †New York University ‡National University of Defense Technology ⋆⋆Queen Mary University of London Abstract packets Match-action Pipeline Traffic Manager Traffic Programmable stage 1 stage N Data-plane programmability is now mainstream. As we find Module 1 Deparser Parser more use cases, deployments need to be able to run multiple . … … . packet-processing modules in a single device. These are likely . to be developed by independent teams, either within the same Module M organization or from multiple organizations. Therefore, we need isolation mechanisms to ensure that modules on the same Figure 1: The RMT/PISA architecture [36] typically consists device do not interfere with each other. This paper presents of a programmable parser/deparser, match-action pipeline and Menshen, an extension of the RMT/PISA pipeline that en- traffic manager. Menshen provides isolation for modules run- forces isolation between different packet-processing modules. ning on top of RMT. Orange and yellow represent resources Menshen is comprised of a set of lightweight hardware prim- allocated to module 1 and M respectively. itives and an extension to the open source P4-16 reference compiler that act in conjunction to meet this goal. We have prototyped Menshen on two FPGA platforms (NetFPGA and that are installed and run on the cloud provider’s devices. An- Corundum). We show that our design provides isolation, and other example is when different teams in an organization write allows new modules to be loaded without impacting the ones different modules, e.g., an in-networking caching module and already running.
    [Show full text]
  • Proquest Dissertations
    TO ENTERTAIN AND RENEW: OPERAS, PUPPET PLAYS AND RITUAL IN SOUTH CHINA by Tuen Wai Mary Yeung Hons Dip, Lingnan University, H.K., 1990 M.A., The University of Lancaster, U.K.,1993 M.A., The University of British Columbia, Canada, 1999 A THESIS SUBIMTTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY in THE FACULTY OF GRADUATE STUDIES (Asian Studies) THE UNIVERSITY OF BRITISH COLUMBIA September 2007 @ Tuen Wai Mary Yeung, 2007 Library and Bibliotheque et 1*1 Archives Canada Archives Canada Published Heritage Direction du Branch Patrimoine de I'edition 395 Wellington Street 395, rue Wellington Ottawa ON K1A0N4 Ottawa ON K1A0N4 Canada Canada Your file Votre reference ISBN: 978-0-494-31964-2 Our file Notre reference ISBN: 978-0-494-31964-2 NOTICE: AVIS: The author has granted a non­ L'auteur a accorde une licence non exclusive exclusive license allowing Library permettant a la Bibliotheque et Archives and Archives Canada to reproduce, Canada de reproduire, publier, archiver, publish, archive, preserve, conserve, sauvegarder, conserver, transmettre au public communicate to the public by par telecommunication ou par Nnternet, preter, telecommunication or on the Internet, distribuer et vendre des theses partout dans loan, distribute and sell theses le monde, a des fins commerciales ou autres, worldwide, for commercial or non­ sur support microforme, papier, electronique commercial purposes, in microform, et/ou autres formats. paper, electronic and/or any other formats. The author retains copyright L'auteur conserve la propriete du droit d'auteur ownership and moral rights in et des droits moraux qui protege cette these.
    [Show full text]
  • Paintings of Zhong Kui and Demons in the Late
    Imagining the Supernatural Grotesque: Paintings of Zhong Kui and Demons in the Late Southern Song (1127-1279) and Yuan (1271-1368) Dynasties Chun-Yi Joyce Tsai Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in the Graduate School of Arts and Sciences COLUMBIA UNIVERSITY 2015 ©2015 Chun-Yi Joyce Tsai All rights reserved ABSTRACT Imagining the Supernatural Grotesque: Paintings of Zhong Kui and Demons in the Late Southern Song (1127-1279) and Yuan (1271-1368) Dynasties Chun-Yi Joyce Tsai This dissertation is the first focused study of images of demons and how they were created and received at the turn of the Southern Song and Yuan periods of China. During these periods, China was in a state of dynastic crisis and transition, and the presence of foreign invaders, the rise of popular culture, the development of popular religion, as well as the advancement of commerce and transportation provided new materials and incentives for painting the supernatural grotesque. Given how widely represented they are in a variety of domains that include politics, literature, theater, and ritual, the Demon Queller Zhong Kui and his demons are good case studies for the effects of new social developments on representations of the supernatural grotesque. Through a careful iconological analysis of three of the earliest extant handscroll paintings that depict the mythical exorcist Zhong Kui travelling with his demonic entourage, this dissertation traces the iconographic sources and uncovers the multivalent cultural significances behind the way grotesque supernatural beings were imagined. Most studies of paintings depicting Zhong Kui focus narrowly on issues of connoisseurship, concentrate on the painter’s intent, and prioritize political metaphors in the paintings.
    [Show full text]
  • Thetroublesome Ghosts
    chapter 9 The Troublesome Ghosts: Part 2 妖魔,第二部 The Lowest-Ranked Ghosts Ghosts are, in general, troublesome creatures. The lower ranks of the Daoist hierarchy of spirits includes many ghosts. Someone who is being harassed by ghosts can call for help from a spirit general. Sometimes, former generals who were heroic in life are honored as spirit generals after their death and are given the title prime marshal [yuanshuai 元帥]. These spirits can carry messages from Daoist masters on earth who are human beings to the deities in the heav- ens. They are also responsible for security and the protection of the celestial realms. They command thousands of ghost soldiers, who can be ordered to attack the ghosts and demons who are causing trouble for human beings. One text I bought is titled Eight Effective Formulas [Ba qinkoujue 八親口 決].1 It was written and illustrated in October 1904 and is filled with incanta- tions calling upon spirit generals and their troops and horses for help in dealing with unwanted ghosts and evil forces. In order to marshal these spirit forces, in the course of a ceremony a Daoist ritual master would bang on the alter a wooden “command placard” [lingpai 令牌] block as a sign of his issuing an order to the spirits. A lingpai I bought in December 2014 that was made in Changsha 長沙 perfectly illustrates its function. It is 5–1/8 inches (13cm) high and a little over 2 inches (6cm) wide, with a square base representing the earth and a rounded top representing the heavens.
    [Show full text]
  • Figure 1 1 Silly Stupid Lion Head
    The Lion in Chinese Space and Social Life A thesis submitted in fulfilment of the requirements for the degree of Doctor of Philosophy Min-Chia Young Faculty of the Built Environment The University of New South Wales Sydney, Australia June 2009 PLEASE TYPE THE UNIVERSITY OF NEW SOUTH WALES Thesis/Dissertation Sheet Surname or Family name: Young First name: Min-Chia Other name/s: Abbreviation for degree as given in the University calendar: PhD School: Architecture Faculty: The Faculty of the Built Environment Title: The Lion in Chinese Space and Social Life Abstract 350 words maximum: (PLEASE TYPE) This thesis is a systematic examination from a historical point of view of the rich diversity of forms and images of the lion motif in Chinese space and social life. Drawing on textual, linguistic and archaeological sources, it addresses the fundamental problem inherent in the study of the lion motif in China, that is, why a foreign import was adopted, transformed and assimilated into an existing culture and how it was then widely rendered in various forms and images as though it had been an indigenous image all along. The examination begins with a search for the origins, names for and appearance of the real lion in China and a comparison of this with the images, roles and powers of the ideological lion in the Chinese mind. It proceeds through an investigation into the liking of the ruling class for lions as tomb guardian beasts in their search for a better afterlife. The thesis then focuses on the adoption of the lion motif by ordinary people as a means of approaching the divine and gaining recognition, in the process of which the image of a ferocious beast was gradually transformed into that of a rotund pet.
    [Show full text]
  • {Download PDF} Life in Ancient China
    LIFE IN ANCIENT CHINA PDF, EPUB, EBOOK Paul Challen | 32 pages | 20 Oct 2004 | Crabtree Publishing Co, Canada | 9780778720676 | English | New York, Canada Daily Life during the Shang Dynasty Even if they had the actual brand burned off, the scar would remain. There are records, though, of quite a few who chose to tattoo themselves as an artistic expression. The image of the serpent began in his right hand, where the jaws of the beast drawn on his thumb and index finger gaped. The body of the snake wound around his wrist, arm, and neck. For the most part, though, tattoos were only worn by convicts or gang members. Benn cites an example of a street gang, who had shaved heads and tattoos, who would beat and rob people in the marketplace of Changan. After they were arrested, the mayor had them publicly beaten to death in the town square, and afterwards, many people in the city with tattoos had them burned off so as not to be associated with the gang. Along with tattoos, body odor was also associated with barbarians and criminals, and the Chinese were very meticulous about perfuming themselves thoroughly. They also wore deodorant made of lime, frankincense, cloves, sweet gum, and birthwort. Bathing every day was thought to invite sickness, and the custom was to bathe only once every five days. Foot odor was another concern, which was controlled through perfumes or camphor. The shoes of the wealthy were soft and made of silk, with upturned toes, while those of the peasant class were coarse boots or sandals made of straw, hemp, or wood.
    [Show full text]
  • La Storia Di Wu Song Nello Shuihu Zhuan
    Corso di Laurea magistrale in Lingue e civiltà dell'Asia e dell'Africa Mediterranea Tesi di Laurea La Storia di Wu Song nello Shuihu zhuan Traduzione, analisi testuale e commento traduttologico Relatore Ch. Prof.ssa Barbara Bisetto Laureando Antonio Capobianco Matricola 815732 Anno Accademico 2013 / 2014 1 INDICE Introduzione 4 1. Lo Shuihu zhuan e la sua storia 8 1.1 La saga dello Shuihu e le sue origini 8 1.2 Fonti letterarie, sviluppo di trama e personaggi 9 1.3 Autori e versioni 11 1.4 Il testo, stile e contenuti 13 2. Wu Song e la sua storia 17 3. Lingua e traduzione 21 Traduzione italiana dei “Dieci capitoli di Wu Song” 31 CAP. 22 La signora Yan porta scompiglio alla contea di Yuncheng Zhu Tong il giusto lascia andare Song Gongming 31 CAP. 23 Nella prefettura di Henghai, Chai Jin accoglie gli ospiti 35 Sul crinale di Jingyang, Wu Song sconfigge la tigre CAP. 24 La bramosa signora Wang parla d'amore L'impaziente Yunge porta scompiglio alla sala da tè 50 CAP. 25 La vecchia Wang incastra Ximen Qing La moglie infedele avvelena Wu Maggiore 88 CAP. 26 Yunge fa chiasso nell'aula del tribunale Wu Song uccide Ximen Qing in duello 100 CAP. 27 Mamma Yaksha vende carne umana sulla via per Mengzhou Il capitano Wu incontra Zhang Qing a Shizipo 118 2 CAP. 28 Wu Song arriva alla guarnigione di Anping A Shi En è tolta ingiustamente la Foresta Gioiosa 131 CAP. 29 Shi En spadroneggia su Mengzhou Wu Song ubriaco batte Jiang lo Spirito Guardiano 142 CAP.
    [Show full text]
  • Download The
    M a r k B e n d e r Ohio State University Columbus, Ohio A Description ofJiangjing (Telling Scriptures) Services in Jingjiang,China Abstract Jiangjing (telling scriptures) is a local style of oral prosimetric narrative performed in rit­ ual contexts in the area of Jingjiang on the north bank of the Yangzi River in Jiangsu Province, China. The style is a local expression of a once popular form of oral narrative known as baojuan (“precious scrolls” or “precious volumes”) that traditionally had asso­ ciations with popular Buddhism and other beliefs. Jiangjing performances are recognized locally as having secular and sacred story repertoires, performed by semi-professional storytellers at nighttime and daytime services, respectively. The storyteller is accompa­ nied by a chorus of village elders who chime in at appropriate points in the narration, a situation that raises interesting questions of performer/audience dynamics. This article includes a brief overview jiangjing’s history, its process of performance, a description of a child-protection ritual held in concert with a storytelling session, and a translation of a sample text 01 jiangjing. Keywords: prosimetric— baojuan~ -jiangjing— children’s rituals— oral performance Asian Folklore Studies, Volume 60,2001: 101-133 INGJIANG JIANGJING 靖 江 講 經 (Jingjiang “telling scriptures”)is a story­ telling tradition performed in the rural areas of Jingjiang County 靖江, Jiangsu 江祿 Province, China (Che 1988,165; D u a n ,W u ,M o u ,1991).1 i typical jiangjing performance, a storyteller sits at a table behind a small Ifolding screen painted with images of deities (see figures 1 and 2),and nar­ rates stories in a mixture of specialized speaking and singing registers.
    [Show full text]
  • Religion, Folk Mínjiān Zōngjiào ​民間宗教
    ◀ Reforms since 1978–1979 Comprehensive index starts in volume 5, page 2667. Religion, Folk Mínjiān zōngjiào ​民間宗教 Throughout the history of China, folk religion villages, always remained faithful to their local gods. Only maintained its fundamental importance to the under the most dire circumstances, when famine, mili- people, even after the development of Daoism, tary unrest, or natural disaster destroyed their villages Buddhism, and Confucianism. The beliefs, and livelihoods, did they voluntarily throw their support behind charismatic religious leaders from a variety of reli- rituals, and morality of these latter streams gious persuasions. Such leaders often promised to lead the of institutionalized religious belief intermin- people out of their misery and into some divine utopia, gled and coexisted with folk religion to create but often the final destination was dystopian rebellion. an eclectic spiritual culture that characterizes Because Chinese culture has been spread over a vast Chinese culture to this day. geographic area, it developed many regional variations. It is therefore extremely difficult to give a definitive descrip- tion of the general characteristics of the national com- munal religion, or even say for certain if such a religion ince their beginnings more than 2,000 years ago, existed. Despite regional differences, however, Chinese the major organized religions of China (Daoism culture was remarkably integrated, and that makes it pos- 道教, Buddhism 佛教, and Confucian-based​­ state sible to identify some universal qualities. Also, because religion 儒教) were never powerful or popular enough to the major religious traditions worked hard to infiltrate the displace completely the communal religion of the people.
    [Show full text]