【24h】

The Power of Evil Choices in Bloom Filters

机译:绽放过滤器中邪恶选择的力量

获取原文

摘要

A Bloom filter is a probabilistic hash-based data structure extensively used in software including online security applications. This paper raises the following important question: Are Bloom filters correctly designed in a security context? The answer is no and the reasons are multiple: bad choices of parameters, lack of adversary models and misused hash functions. Indeed, developers truncate cryptographic digests without a second thought on the security implications. This work constructs adversary models for Bloom filters and illustrates attacks on three applications, namely SCRAPY web spider, BITLY DABLOOMS spam filter and SQUID cache proxy. As a general impact, filters are forced to systematically exhibit worst-case behavior. One of the reasons being that Bloom filter parameters are always computed in the average case. We compute the worst-case parameters in adversarial settings, show how to securely and efficiently use cryptographic hash functions and propose several other countermeasures to mitigate our attacks.
机译:绽放过滤器是基于概率的散列数据结构,其广泛用于包括在线安全应用程序的软件。本文提出以下重要问题:是否在安全上下文中正确设计了盛开的过滤器?答案是否定的,原因是多个:参数的糟糕选择,缺乏对手模型和误用的哈希职能。实际上,开发人员截断了加密摘要而不对安全影响进行第二次思考。这项工作构造了盛开过滤器的对手模型,并说明了三个应用程序的攻击,即Scrapy Web Spam,达到Dablooms垃圾邮件过滤器和Squid缓存代理。作为一般影响,滤波器被迫系统地表现出最坏情况的行为。作为绽放过滤参数的原因之一始终以平均案例计算。我们在对策中计算了最坏情况的参数,展示了如何安全有效地使用加密哈希函数,并提出几种其他对策来缓解我们的攻击。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号