Ileak: a Lightweight System for Detecting Inadvertent Information Leaks

Ileak: a Lightweight System for Detecting Inadvertent Information Leaks

iLeak: A Lightweight System for Detecting Inadvertent Information Leaks Vasileios P. Kemerlis, Vasilis Pappas, Georgios Portokalidis, and Angelos D. Keromytis Network Security Lab Computer Science Department Columbia University, New York, NY, USA {vpk, vpappas, porto, angelos}@cs.columbia.edu Abstract—Data loss incidents, where data of sensitive nature Most research on detecting and preventing information are exposed to the public, have become too frequent and have leaks has focused on applying strict information flow control caused damages of millions of dollars to companies and other (IFC). Sensitive data are labeled and tracked throughout organizations. Repeatedly, information leaks occur over the Internet, and half of the time they are accidental, caused by an application’s execution to detect their illegal propaga- user negligence, misconfiguration of software, or inadequate tion (e.g., their transmission over the network). Approaches understanding of an application’s functionality. This paper such as Jif [6] and JFlow [7] achieve IFC by introducing presents iLeak, a lightweight, modular system for detecting extensions to the Java programming language, while others inadvertent information leaks. Unlike previous solutions, iLeak enforce it dynamically [8], or propose new operating system builds on components already present in modern computers. In particular, we employ system tracing facilities and data (OS) designs [9]. Fine-grained IFC mechanisms require that indexing services, and combine them in a novel way to detect sensitive data are labeled by the user beforehand, but as data leaks. Our design consists of three components: uaudits are the amount of data stored in desktops continuously grows, responsible for capturing the information that exits the system, locating documents and files containing personal data be- while Inspectors use the indexing service to identify if the comes burdensome. Additionally, systems in nowadays are transmitted data belong to files that contain potentially sensitive information. The Trail Gateway handles the communication and an amalgamation of different components that interact in synchronization of uaudits and Inspectors. We implemented unpredictable ways, and are frequently used in ways that iLeak on Mac OS X using DTrace and the Spotlight indexing their designers and developers did not anticipate. As a result service. Finally, we show that iLeak is indeed lightweight, since IFC solutions have seen little use in production systems, it only incurs 4% overhead on protected applications. and almost none on desktops that are responsible for most Keywords-information leaks; system tracing; desktop search; accidental data leaks. Commercial data loss prevention (DLP) solutions take a I. INTRODUCTION different approach. They monitor network communications The damages caused to companies and individuals due (e.g., email, HTTP, P2P) to identify files or messages that to the exposure of sensitive data are estimated to be in may contain sensitive data, based on patterns that describe the range of millions of dollars [1]. Generally, data loss is credit card numbers, financial data, design documents, and associated with malicious intent originating from individuals so forth. Commercial DLP solutions are more pragmatic than or organizations that aim to exfiltrate information of some strict IFC, but while they often do protect against data loss, value (e.g., trade secrets, credit card numbers). However, they are costly and have a low benefit-cost ratio for individ- in reality, about half of the data breaches reported are uals and small businesses. Furthermore, network-based DLP unintentional [2]. is not able to operate on encrypted connections, or protect In the past, inadvertent information leaks have created portable devices such as notebooks when they are connecting serious commotion in the press, and were the source of though possibly unsafe networks. To protect against data embarrassment for the large companies and government loss under these conditions, end-host deployment of DLP is organizations that suffered them. An employee who in- required, which further increases costs. stalled file-sharing peer-to-peer (P2P) software on his lap- On the other hand, modern OSs already provide mecha- top, unknowingly exposed documents containing personal nisms that we could put to use to detect information leaks. data belonging to the company’s employees [3]. Another They offer safe and efficient tracing facilities that can be negligent hospital employee posted sensitive patient data used for on demand kernel-level debugging, system-wide on the Web [4]. In other cases, users may be unaware performance evaluation, subsystem interaction analysis, and that an otherwise legitimate application is accessing and so on. DTrace [10], SystemTap [11], and LTTng [12] are transmitting sensitive data. For instance, Facebook may read indicative examples of such frameworks that are available a user’s address book to recommend new friends, or to on commodity desktop systems. Additionally, most of the automatically invite them to join, without the user even being prevailing desktop OSs also support indexing mechanisms aware of it [5]. that increase the efficiency of searching user content. Tools such as Google Desktop [13] and Beagle [14] are II. DETECTING INFORMATION LEAKS now commonplace on desktops, offering advanced “desktop iLeak establishes a lightweight detection service for ac- search” capabilities using a variety of attributes like file cidental information leaks by composing together facilities metadata, semantic information, as well as user preferences. that are already available and integrated in commodity OSs. We present iLeak, a lightweight system for detecting In order for iLeak to be practical, we identify the following inadvertent information leaks by combining together dy- important properties that a detection facility should incorpo- namic tracing and information retrieval (IR) services that rate: transparency, flexibility, simplicity, and performance. are already available and integrated in commodity OSs. The iLeak offers a composite detection service without demand- key observation behind our work is that such services are ing from the user to change its working habits, or run already deployed and widely used in desktop systems (but its software in heavyweight hypervisors [18] and restrictive for completely different purposes). In brief, iLeak operates sandboxes [19]. The whole detection process is performed by tracing the inputs to function and system calls that in the background and in parallel with the normal system transmit or encrypt data, and consequently searching for operation, without interfering with the user’s tasks (e.g., by those inputs in files and locations that contain sensitive data. pausing execution and requesting for the authorization of By coupling together those two concepts, we demonstrate particular actions). that it is possible to offer a lightweight information loss iLeak tries to infer whether outbound data are sensitive detection mechanism for desktops as a composable service. or not by relying upon a set of files that contain critical We do not address data loss that occurs due to an user information. The construction of this set, though it is orchestrated attack, or software exploitation by a malicious of great importance for the effectiveness of a data leakage entity, even though iLeak could still be useful in certain detection tool, is orthogonal to iLeak and does not affect our cases. Nevertheless, we acknowledge the gravity of such design choices regarding its internal structure and operation. incidents, like the recent loss of more than 100,000 emails In this study, we consider that this pool can be populated of high-profile iPad owners [15]. as follows. First, every file that belongs into a list of OS- The main contributions of our work are the following: dependent application data locations (e.g., “HOME/.*“ files 1) We present iLeak, a lightweight “personal” data loss in Linux, the “HOME/Application Data” folder in Windows, detection system that utilizes existing system facilities. etc), which frequently contain personal information, is au- Specifically call tracing and data indexing. To the tomatically considered as sensitive and included in our set. extent of our knowledge, we are the first to employ Next, the user can also indicate filesystem places that contain such mechanisms to detect information leaks. sensitive documents, or critical information in general, just 2) We transparently handle applications that use encryp- by “tagging” them using the extended filesystem attributes tion (e.g., browsers) and data encoding (e.g., emailers) that most OSs support. Finally, automated document charac- through known libraries such as OpenSSL. terization tools, such as Cornell’s Spider or SENF, can also 3) We propose an extensible, component-based design, be used to automatically populate the pool with the files they which can be easily implemented on various OS identify as containing critical data. architectures, and we present our prototype for the Armed with a set of tagged sensitive files and locations, Mac OS X systems. we distribute a set of “sensors” on the system that utilize 4) We evaluate iLeak and show that on average it imposes dynamic tracing for intercepting outbound data. This way only 4% overhead to the users. we are able to efficiently and effectively decide whether the exfiltrated information belongs to a sensitive data store, or Note that our approach is orthogonal to security

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    8 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us