Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Peng Ning is active.

Publication


Featured researches published by Peng Ning.


computer and communications security | 2017

SPOKE: Scalable Knowledge Collection and Attack Surface Analysis of Access Control Policy for Security Enhanced Android

Ruowen Wang; Ahmed M. Azab; William Enck; Ninghui Li; Peng Ning; Xun Chen; Wenbo Shen; Yueqiang Cheng

SEAndroid is a mandatory access control (MAC) framework that can confine faulty applications on Android. Nevertheless, the effectiveness of SEAndroid enforcement depends on the employed policy. The growing complexity of Android makes it difficult for policy engineers to have complete domain knowledge on every system functionality. As a result, policy engineers sometimes craft over-permissive and ineffective policy rules, which unfortunately increased the attack surface of the Android system and have allowed multiple real-world privilege escalation attacks. We propose SPOKE, an SEAndroid Policy Knowledge Engine, that systematically extracts domain knowledge from rich-semantic functional tests and further uses the knowledge for characterizing the attack surface of SEAndroid policy rules. Our attack surface analysis is achieved by two steps: 1) It reveals policy rules that cannot be justified by the collected domain knowledge. 2) It identifies potentially over-permissive access patterns allowed by those unjustified rules as the attack surface. We evaluate SPOKE using 665 functional tests targeting 28 different categories of functionalities developed by Samsung Android Team. SPOKE successfully collected 12,491 access patterns for the 28 categories as domain knowledge, and used the knowledge to reveal 320 unjustified policy rules and 210 over-permissive access patterns defined by those rules, including one related to the notorious libstagefright vulnerability. These findings have been confirmed by policy engineers.


computer and communications security | 2017

PrivWatcher: Non-bypassable Monitoring and Protection of Process Credentials from Memory Corruption Attacks

Quan Chen; Ahmed M. Azab; Guruprasad Ganesh; Peng Ning

Commodity operating systems kernels are typically implemented using low-level unsafe languages, which leads to the inevitability of memory corruption vulnerabilities. Multiple defense techniques are widely adopted to mitigate the impact of memory corruption on executable code and control data. Nevertheless, there has not been much attention to defend against corruption of non-control data despite the fact that previous incidents of kernel exploitation showed that corrupting non-control data is a real threat. We present PrivWatcher, a framework for monitoring and protecting the integrity of process credentials and their usage contexts from memory corruption attacks. PrivWatcher solves multiple challenges to achieve this objective. It introduces techniques to isolate and protect the data that define process credentials and guarantee the locality of this data within the protected memory. Then, by adopting a dual reference monitor model, it guarantees the Time of Check To Time of Use (TOCTTOU) consistency between verification and usage contexts for process credentials. Moreover, it provides a secure mechanism that allows the presumably protected kernel code to verify the protected data without relying on unprotected data fields. PrivWatcher provides non-bypassable integrity assurances for process credentials and can be adapted to enforce a variety of integrity policies. In this paper, we demonstrate an application of PrivWatcher that enforces the original semantics of the OS kernels access control policy: a change in process privileges is legitimate only if an uncompromised kernel would have allowed it. We implemented a PrivWatcher prototype to protect Ubuntu Linux running on x86-64. Evaluation of our prototype showed that PrivWatcher is effective and efficient.


Archive | 2015

METHODS AND APPARATUS TO ENABLE RUNTIME CHECKSUM VERIFICATION OF BLOCK DEVICE IMAGES

Jitesh Shah; Song Wei; Ahmed M. Azab; Xun Chen; Peng Ning; Wenbo Shen; Michael Grace


Archive | 2016

System and Method for Fraud Detection in a Mobile Device

Kunal Patel; Abraham Kang; Bulent Kasman; Peng Ning; Michael Grace


Archive | 2015

METHODS AND APPARATUS FOR PROTECTING OPERATING SYSTEM DATA

Quan Chen; Ahmed M. Azab; Peng Ning; Gurupradsad Ganesh


Archive | 2018

AUTHORIZED CONTROL OF AN EMBEDDED SYSTEM USING END-TO-END SECURE ELEMENT COMMUNICATION

Peng Ning; Yueh-hsun Lin; Stephen E. Mclaughlin; Michael Grace; Ahmed M. Azab; Rohan Bhutkar; Yong Choi


Archive | 2017

APPARATUS AND METHOD FOR TRANSPARENT, SECURE ELEMENT-BASED MEDIATION OF ON-BOARD DIAGNOSTIC OPERATIONS

Peng Ning; Stephen E. Mclaughlin; Michael Grace; Ahmed M. Azab; Rohan Bhutkar; Wenbo Shen; Xun Chen; Yong Choi; Ken Chen


Archive | 2017

métodos, sistemas, e meios legíveis por computador para monitoramento ativo, proteção de memória e verificação de integridade de dispositivos alvos

Ahmed Azab; Peng Ning


Archive | 2016

Apparatus and method for fraud detection in a mobile device

Kunal Patel; Abraham Kang; Bulent Kasman; Peng Ning; Michael Grace


Archive | 2016

Appareil et procédé de protection de composants système intégrés critiques au moyen d'un moniteur basé sur un élément sécurisé isolé du matériel

Peng Ning; Stephen E. Mclaughlin; Michael Grace; Ahmed M. Azab; Rohan Bhutkar; Wenbo Shen; Xun Chen; Yong Choi; Ken Chen

Collaboration


Dive into the Peng Ning's collaboration.

Researchain Logo
Decentralizing Knowledge