skip to main content
10.1145/2517349.2522725acmconferencesArticle/Chapter ViewAbstractPublication PagessospConference Proceedingsconference-collections
research-article
Open Access

Asynchronous intrusion recovery for interconnected web services

Published:03 November 2013Publication History

ABSTRACT

Recovering from attacks in an interconnected system is difficult, because an adversary that gains access to one part of the system may propagate to many others, and tracking down and recovering from such an attack requires significant manual effort. Web services are an important example of an interconnected system, as they are increasingly using protocols such as OAuth and REST APIs to integrate with one another. This paper presents Aire, an intrusion recovery system for such web services. Aire addresses several challenges, such as propagating repair across services when some servers may be unavailable, and providing appropriate consistency guarantees when not all servers have been repaired yet. Experimental results show that Aire can recover from four realistic attacks, including one modeled after a recent Facebook OAuth vulnerability; that porting existing applications to Aire requires little effort; and that Aire imposes a 19--30% CPU overhead and 6--9 KB/request storage cost for Askbot, an existing web application.

Skip Supplemental Material Section

Supplemental Material

d2-01-taesoo-kim.mp4

mp4

1 GB

References

  1. Askbot -- create your Q&A forum. http://www.askbot.com.Google ScholarGoogle Scholar
  2. Django: the Web framework for perfectionists with deadlines. http://www.djangoproject.com.Google ScholarGoogle Scholar
  3. OAuth community site. http://oauth.net.Google ScholarGoogle Scholar
  4. M. K. Aguilera, J. C. Mogul, J. L. Wiener, P. Reynolds, and A. Muthitacharoen. Performance debugging for distributed systems of black boxes. In Proceedings of the 19th ACM Symposium on Operating Systems Principles (SOSP), Bolton Landing, NY, Oct. 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. İ. E. Akkuş and A. Goel. Data recovery for web applications. In Proceedings of the 40th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Chicago, IL, June--July 2010.Google ScholarGoogle ScholarCross RefCross Ref
  6. S. Chacon. Pro Git. Apress, Aug. 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. R. Chandra, T. Kim, M. Shah, N. Narula, and N. Zeldovich. Intrusion recovery for database-backed web applications. In Proceedings of the 23rd ACM Symposium on Operating Systems Principles (SOSP), pages 101--114, Cascais, Portugal, Oct. 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. J. Dunagan, A. X. Zheng, and D. R. Simon. Heatray: Combating identity snowball attacks using machine learning, combinatorial optimization and attack graphs. In Proceedings of the 22nd ACM Symposium on Operating Systems Principles (SOSP), Big Sky, MT, Oct. 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. N. Goldshlager. How I hacked Facebook OAuth to get full permission on any Facebook account. http://www.nirgoldshlager.com/2013/02/how-i-hacked-facebook-oauth-to-get-full.html, Feb. 2013.Google ScholarGoogle Scholar
  10. N. Goldshlager. How I hacked any Facebook account...again! http://www.nirgoldshlager.com/2013/03/how-i-hacked-any-facebook-accountagain.html, Mar. 2013.Google ScholarGoogle Scholar
  11. N. Goldshlager. How I hacked Instagram accounts. http://www.breaksec.com/?p=6164, May 2013.Google ScholarGoogle Scholar
  12. Google, Inc. Google apps script, 2013. https://script.google.com.Google ScholarGoogle Scholar
  13. E. Hammer-Lahav. OAuth security advisory: 2009.1. http://oauth.net/advisories/2009-1/, Apr. 2009.Google ScholarGoogle Scholar
  14. ifttt, Inc. Put the internet to work for you, 2013. https://ifttt.com.Google ScholarGoogle Scholar
  15. T. Kim, X. Wang, N. Zeldovich, and M. F. Kaashoek. Intrusion recovery using selective re-execution. In Proceedings of the 9th Symposium on Operating Systems Design and Implementation (OSDI), pages 89--104, Vancouver, Canada, Oct. 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. T. Kim, R. Chandra, and N. Zeldovich. Recovering from intrusions in distributed systems with Dare. In Proceedings of the 3rd Asia-Pacific Workshop on Systems, Seoul, South Korea, July 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. T. Kim, R. Chandra, and N. Zeldovich. Efficient patch-based auditing for web application vulnerabilities. In Proceedings of the 10th Symposium on Operating Systems Design and Implementation (OSDI), pages 193--206, Hollywood, CA, Oct. 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. S. T. King and P. M. Chen. Backtracking intrusions. ACM Transactions on Computer Systems, 23(1):51--76, Feb. 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. P. Mahajan, R. Kotla, C. C. Marshall, V. Ramasubramanian, T. L. Rodeheffer, D. B. Terry, and T. Wobber. Effective and efficient compromise recovery for weakly consistent replication. In Proceedings of the ACM EuroSys Conference, Nuremberg, Germany, Mar. 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. M. Mimoso. Twitter OAuth API keys leaked. http://threatpost.com/twitter-oauth-api-keys-leaked-030713, Mar. 2013.Google ScholarGoogle Scholar
  21. J. Simmonds, S. Ben-David, and M. Chechik. Guided recovery for web service applications. In Proceedings of the 18th ACM SIGSOFT International Symposium on Foundations of Software Engineering, Santa Fe, NM, Nov. 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Yahoo, Inc. Pipes: Rewire the web, 2013. http://pipes.yahoo.com.Google ScholarGoogle Scholar
  23. Zapier, Inc. Automate the web, 2013. https://zapier.com.Google ScholarGoogle Scholar

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    SOSP '13: Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles
    November 2013
    498 pages
    ISBN:9781450323888
    DOI:10.1145/2517349

    Copyright © 2013 Owner/Author

    Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 3 November 2013

    Check for updates

    Qualifiers

    • research-article

    Acceptance Rates

    Overall Acceptance Rate131of716submissions,18%

    Upcoming Conference

    SOSP '24

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader