Putting Trojans on the Horns of a Dilemma: Redundancy for Information Theft Detection

  • Authors:
  • Jedidiah R. Crandall;John Brevik;Shaozhi Ye;Gary Wassermann;Daniela A. Oliveira;Zhendong Su;S. Felix Wu;Frederic T. Chong

  • Affiliations:
  • Dept. of Computer Science, University of New Mexico,;Dept. of Mathematics and Statistics, California State University, Long Beach,;Dept. of Computer Science, University of California at Davis,;Dept. of Computer Science, University of California at Davis,;Dept. of Computer Science, University of California at Davis,;Dept. of Computer Science, University of California at Davis,;Dept. of Computer Science, University of California at Davis,;Dept. of Computer Science, University of California at Santa Barbara,

  • Venue:
  • Transactions on Computational Science IV
  • Year:
  • 2009

Quantified Score

Hi-index 0.01

Visualization

Abstract

Conventional approaches to either information flow security or intrusion detection are not suited to detecting Trojans that steal information such as credit card numbers using advanced cryptovirological and inference channel techniques. We propose a technique based on repeated deterministic replays in a virtual machine to detect the theft of private information. We prove upper bounds on the average amount of information an attacker can steal without being detected, even if they are allowed an arbitrary distribution of visible output states. Our intrusion detection approach is more practical than traditional approaches to information flow security. We show that it is possible to, for example, bound the average amount of information an attacker can steal from a 53-bit credit card number to less than a bit by sampling only 11 of the 253 possible outputs visible to the attacker, using a two-pronged approach of hypothesis testing and information theory.