Peng Ning
Samsung
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Peng Ning.
computer and communications security | 2017
Ruowen Wang; Ahmed M. Azab; William Enck; Ninghui Li; Peng Ning; Xun Chen; Wenbo Shen; Yueqiang Cheng
SEAndroid is a mandatory access control (MAC) framework that can confine faulty applications on Android. Nevertheless, the effectiveness of SEAndroid enforcement depends on the employed policy. The growing complexity of Android makes it difficult for policy engineers to have complete domain knowledge on every system functionality. As a result, policy engineers sometimes craft over-permissive and ineffective policy rules, which unfortunately increased the attack surface of the Android system and have allowed multiple real-world privilege escalation attacks. We propose SPOKE, an SEAndroid Policy Knowledge Engine, that systematically extracts domain knowledge from rich-semantic functional tests and further uses the knowledge for characterizing the attack surface of SEAndroid policy rules. Our attack surface analysis is achieved by two steps: 1) It reveals policy rules that cannot be justified by the collected domain knowledge. 2) It identifies potentially over-permissive access patterns allowed by those unjustified rules as the attack surface. We evaluate SPOKE using 665 functional tests targeting 28 different categories of functionalities developed by Samsung Android Team. SPOKE successfully collected 12,491 access patterns for the 28 categories as domain knowledge, and used the knowledge to reveal 320 unjustified policy rules and 210 over-permissive access patterns defined by those rules, including one related to the notorious libstagefright vulnerability. These findings have been confirmed by policy engineers.
computer and communications security | 2017
Quan Chen; Ahmed M. Azab; Guruprasad Ganesh; Peng Ning
Commodity operating systems kernels are typically implemented using low-level unsafe languages, which leads to the inevitability of memory corruption vulnerabilities. Multiple defense techniques are widely adopted to mitigate the impact of memory corruption on executable code and control data. Nevertheless, there has not been much attention to defend against corruption of non-control data despite the fact that previous incidents of kernel exploitation showed that corrupting non-control data is a real threat. We present PrivWatcher, a framework for monitoring and protecting the integrity of process credentials and their usage contexts from memory corruption attacks. PrivWatcher solves multiple challenges to achieve this objective. It introduces techniques to isolate and protect the data that define process credentials and guarantee the locality of this data within the protected memory. Then, by adopting a dual reference monitor model, it guarantees the Time of Check To Time of Use (TOCTTOU) consistency between verification and usage contexts for process credentials. Moreover, it provides a secure mechanism that allows the presumably protected kernel code to verify the protected data without relying on unprotected data fields. PrivWatcher provides non-bypassable integrity assurances for process credentials and can be adapted to enforce a variety of integrity policies. In this paper, we demonstrate an application of PrivWatcher that enforces the original semantics of the OS kernels access control policy: a change in process privileges is legitimate only if an uncompromised kernel would have allowed it. We implemented a PrivWatcher prototype to protect Ubuntu Linux running on x86-64. Evaluation of our prototype showed that PrivWatcher is effective and efficient.
Archive | 2015
Jitesh Shah; Song Wei; Ahmed M. Azab; Xun Chen; Peng Ning; Wenbo Shen; Michael Grace
Archive | 2016
Kunal Patel; Abraham Kang; Bulent Kasman; Peng Ning; Michael Grace
Archive | 2015
Quan Chen; Ahmed M. Azab; Peng Ning; Gurupradsad Ganesh
Archive | 2018
Peng Ning; Yueh-hsun Lin; Stephen E. Mclaughlin; Michael Grace; Ahmed M. Azab; Rohan Bhutkar; Yong Choi
Archive | 2017
Peng Ning; Stephen E. Mclaughlin; Michael Grace; Ahmed M. Azab; Rohan Bhutkar; Wenbo Shen; Xun Chen; Yong Choi; Ken Chen
Archive | 2017
Ahmed Azab; Peng Ning
Archive | 2016
Kunal Patel; Abraham Kang; Bulent Kasman; Peng Ning; Michael Grace
Archive | 2016
Peng Ning; Stephen E. Mclaughlin; Michael Grace; Ahmed M. Azab; Rohan Bhutkar; Wenbo Shen; Xun Chen; Yong Choi; Ken Chen