File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Kakute: A Precise, Unified Information Flow Analysis System for Big-data Security

TitleKakute: A Precise, Unified Information Flow Analysis System for Big-data Security
Authors
KeywordsBig-data
Data-intensive Scalable Computing System
Information Flow Tracking
Issue Date2017
PublisherACM. The Proceedings' web site is located at https://dl.acm.org/citation.cfm?id=3134600
Citation
Proceedings of the 33rd Annual Computer Security Applications Conference (ACSAC 2017), Orlando, FL, USA, 4-8 December 2017, p. 79-90 How to Cite?
AbstractBig-data frameworks (e.g., Spark) enable computations on tremen- dous data records generated by third parties, which introduces vari- ous security and reliability problems such as information leakage and programming bugs. Existing systems for big-data security (e.g., Titian) track data transformations in a record level, so they are impre- cise and too coarse-grained for these problems. For instance, when we ran Titian to drill down input records that produced a buggy output record, Titian reported 3 to 9 orders of magnitude more input records than the actual ones. Information Flow Tracking (IFT) is a conventional approach for precise information control. However, extant IFT systems are neither efficient nor complete for big-data frameworks, because theses frameworks are data-intensive, and data flowing across hosts is often ignored by IFT. This paper presents KAKUTE, the first precise, fine-grained infor- mation flow analysis system for big-data. Our insight on making IFT efficient is that most fields in a data record often have the same IFT tags, and we present two new efficient techniques called Reference Propagation and Tag Sharing. In addition, we design an efficient, complete cross-host information flow propagation approach. Eval- uations on 7 diverse big-data programs (e.g., WordCount) shows that KAKUTE has merely 32.3% overhead even when fine-grained information control is enabled. Compared with Titian, KAKUTE precisely drilled down the actual bug inducing input records, a huge reduction of 3 to 9 orders of magnitude. KAKUTE’s performance overhead is comparable with Titian. Furthermore, KAKUTE effec- tively detected 13 real-world security and reliability bugs in 4 diverse problems, including information leakage, data provenance, program- ming and performance bugs. KAKUTE’s source code is available at https://github.com/acsac17-p78/kakute.
DescriptionSession: Big Data Analytics
Persistent Identifierhttp://hdl.handle.net/10722/245449
ISBN
ISI Accession Number ID

 

DC FieldValueLanguage
dc.contributor.authorJiang, J-
dc.contributor.authorZhao, S-
dc.contributor.authorAlsayed, D-
dc.contributor.authorWang, Y-
dc.contributor.authorCui, H-
dc.contributor.authorLiang, F-
dc.contributor.authorGu, Z-
dc.date.accessioned2017-09-18T02:10:55Z-
dc.date.available2017-09-18T02:10:55Z-
dc.date.issued2017-
dc.identifier.citationProceedings of the 33rd Annual Computer Security Applications Conference (ACSAC 2017), Orlando, FL, USA, 4-8 December 2017, p. 79-90-
dc.identifier.isbn978-1-4503-5345-8-
dc.identifier.urihttp://hdl.handle.net/10722/245449-
dc.descriptionSession: Big Data Analytics-
dc.description.abstractBig-data frameworks (e.g., Spark) enable computations on tremen- dous data records generated by third parties, which introduces vari- ous security and reliability problems such as information leakage and programming bugs. Existing systems for big-data security (e.g., Titian) track data transformations in a record level, so they are impre- cise and too coarse-grained for these problems. For instance, when we ran Titian to drill down input records that produced a buggy output record, Titian reported 3 to 9 orders of magnitude more input records than the actual ones. Information Flow Tracking (IFT) is a conventional approach for precise information control. However, extant IFT systems are neither efficient nor complete for big-data frameworks, because theses frameworks are data-intensive, and data flowing across hosts is often ignored by IFT. This paper presents KAKUTE, the first precise, fine-grained infor- mation flow analysis system for big-data. Our insight on making IFT efficient is that most fields in a data record often have the same IFT tags, and we present two new efficient techniques called Reference Propagation and Tag Sharing. In addition, we design an efficient, complete cross-host information flow propagation approach. Eval- uations on 7 diverse big-data programs (e.g., WordCount) shows that KAKUTE has merely 32.3% overhead even when fine-grained information control is enabled. Compared with Titian, KAKUTE precisely drilled down the actual bug inducing input records, a huge reduction of 3 to 9 orders of magnitude. KAKUTE’s performance overhead is comparable with Titian. Furthermore, KAKUTE effec- tively detected 13 real-world security and reliability bugs in 4 diverse problems, including information leakage, data provenance, program- ming and performance bugs. KAKUTE’s source code is available at https://github.com/acsac17-p78/kakute.-
dc.languageeng-
dc.publisherACM. The Proceedings' web site is located at https://dl.acm.org/citation.cfm?id=3134600-
dc.relation.ispartofAnnual Computer Security Applications Conference (ACSAC) 2017-
dc.subjectBig-data-
dc.subjectData-intensive Scalable Computing System-
dc.subjectInformation Flow Tracking-
dc.titleKakute: A Precise, Unified Information Flow Analysis System for Big-data Security-
dc.typeConference_Paper-
dc.identifier.emailWang, Y: amywang@hku.hk-
dc.identifier.emailCui, H: heming@hku.hk-
dc.identifier.emailGu, Z: zqgu@hku.hk-
dc.identifier.authorityCui, H=rp02008-
dc.identifier.doi10.1145/3134600.3134607-
dc.identifier.scopuseid_2-s2.0-85038893861-
dc.identifier.hkuros276668-
dc.identifier.spage79-
dc.identifier.epage90-
dc.identifier.isiWOS:000540643200007-
dc.publisher.placeNew York, NY-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats