Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Shweta Shinde is active.

Publication


Featured researches published by Shweta Shinde.


ieee symposium on security and privacy | 2016

Data-Oriented Programming: On the Expressiveness of Non-control Data Attacks

Hong Hu; Shweta Shinde; Sendroiu Adrian; Zheng Leong Chua; Prateek Saxena; Zhenkai Liang

As control-flow hijacking defenses gain adoption, it is important to understand the remaining capabilities of adversaries via memory exploits. Non-control data exploits are used to mount information leakage attacks or privilege escalation attacks program memory. Compared to control-flow hijacking attacks, such non-control data exploits have limited expressiveness, however, the question is: what is the real expressive power of non-control data attacks? In this paper we show that such attacks are Turing-complete. We present a systematic technique called data-oriented programming (DOP) to construct expressive non-control data exploits for arbitrary x86 programs. In the experimental evaluation using 9 programs, we identified 7518 data-oriented x86 gadgets and 5052 gadget dispatchers, which are the building blocks for DOP. 8 out of 9 real-world programs have gadgets to simulate arbitrary computations and 2 of them are confirmed to be able to build Turing-complete attacks. We build 3 end-to-end attacks to bypass randomization defenses without leaking addresses, to run a network bot which takes commands from the attacker, and to alter the memory permissions. All the attacks work in the presence of ASLR and DEP, demonstrating how the expressiveness offered by DOP significantly empowers the attacker.


programming language design and implementation | 2014

A model counter for constraints over unbounded strings

Loi Luu; Shweta Shinde; Prateek Saxena; Brian Demsky

Model counting is the problem of determining the number of solutions that satisfy a given set of constraints. Model counting has numerous applications in the quantitative analyses of program execution time, information flow, combinatorial circuit designs as well as probabilistic reasoning. We present a new approach to model counting for structured data types, specifically strings in this work. The key ingredient is a new technique that leverages generating functions as a basic primitive for combinatorial counting. Our tool SMC which embodies this approach can model count for constraints specified in an expressive string language efficiently and precisely, thereby outperforming previous finite-size analysis tools. SMC is expressive enough to model constraints arising in real-world JavaScript applications and UNIX C utilities. We demonstrate the practical feasibility of performing quantitative analyses arising in security applications, such as determining the comparative strengths of password strength meters and determining the information leakage via side channels.


computer and communications security | 2013

AUTOCRYPT: enabling homomorphic computation on servers to protect sensitive web content

Shruti Tople; Shweta Shinde; Zhaofeng Chen; Prateek Saxena

Web servers are vulnerable to a large class of attacks which can allow network attacker to steal sensitive web content. In this work, we investigate the feasibility of a web server architecture, wherein the vulnerable server VM runs on a trusted cloud. All sensitive web content is made available to the vulnerable server VM in encrypted form, thereby limiting the effectiveness of data-stealing attacks through server VM compromise. In this context, the main challenge is to allow the legitimate functionality of the untrusted server VM to work. As a step towards this goal, we develop a tool called AutoCrypt, which transforms a subset of existing C functionality in the web stack to operate on encrypted sensitive content. We show that such a transformation is feasible for several standard Unix utilities available in a typical LAMP stack, with no developer effort. Key to achieving this expressiveness over encrypted data, is our scheme to combine and convert between partially-homomorphic encryption (PHE) schemes using a small TCB in the trusted cloud hypervisor. We show that x86 code transformed with AutoCrypt achieves performance that is significantly better than its alternatives (downloading to a trusted client, or using fully-homomorphic encryption).


foundations of software engineering | 2015

Auto-patching DOM-based XSS at scale

Inian Parameshwaran; Enrico Budianto; Shweta Shinde; Hung Dang; Atul Sadhu; Prateek Saxena

DOM-based cross-site scripting (XSS) is a client-side code injection vulnerability that results from unsafe dynamic code generation in JavaScript applications, and has few known practical defenses. We study dynamic code evaluation practices on nearly a quarter million URLs crawled starting from the the Alexa Top 1000 websites. Of 777,082 cases of dynamic HTML/JS code generation we observe, 13.3% use unsafe string interpolation for dynamic code generation — a well-known dangerous coding practice. To remedy this, we propose a technique to generate secure patches that replace unsafe string interpolation with safer code that utilizes programmatic DOM construction techniques. Our system transparently auto-patches the vulnerable site while incurring only 5.2 − 8.07% overhead. The patching mechanism requires no access to server-side code or modification to browsers, and thus is practical as a turnkey defense.


foundations of software engineering | 2015

DexterJS: robust testing platform for DOM-based XSS vulnerabilities

Inian Parameshwaran; Enrico Budianto; Shweta Shinde; Hung Dang; Atul Sadhu; Prateek Saxena

DOM-based cross-site scripting (XSS) is a client-side vulnerability that pervades JavaScript applications on the web, and has few known practical defenses. In this paper, we introduce DEXTERJS, a testing platform for detecting and validating DOM-based XSS vulnerabilities on web applications. DEXTERJS leverages source-to source rewriting to carry out character-precise taint tracking when executing in the browser context—thus being able to identify vulnerable information flows in a web page. By scanning a web page, DEXTERJS produces working exploits that validate DOM-based XSS vulnerability on the page. DEXTERJS is robust, has been tested on Alexa’s top 1000 sites, and has found a total of 820 distinct zero-day DOM-XSS confirmed exploits automatically.


computer and communications security | 2016

Preventing Page Faults from Telling Your Secrets

Shweta Shinde; Zheng Leong Chua; Viswesh Narayanan; Prateek Saxena


network and distributed system security symposium | 2017

Panoply: Low-TCB Linux Applications With SGX Enclaves.

Shweta Shinde; Dat Le Tien; Shruti Tople; Prateek Saxena


arXiv: Cryptography and Security | 2015

Preventing Your Faults From Telling Your Secrets: Defenses Against Pigeonhole Attacks.

Shweta Shinde; Zheng Leong Chua; Viswesh Narayanan; Prateek Saxena


arXiv: Programming Languages | 2018

Neuro-Symbolic Execution: The Feasibility of an Inductive Approach to Symbolic Execution.

Shiqi Shen; Soundarya Ramesh; Shweta Shinde; Abhik Roychoudhury; Prateek Saxena


arXiv: Cryptography and Security | 2018

BesFS: Mechanized Proof of an Iago-Safe Filesystem for Enclaves.

Shweta Shinde; Shengyi Wang; Pinghai Yuan; Aquinas Hobor; Abhik Roychoudhury; Prateek Saxena

Collaboration


Dive into the Shweta Shinde's collaboration.

Top Co-Authors

Avatar

Prateek Saxena

National University of Singapore

View shared research outputs
Top Co-Authors

Avatar

Shruti Tople

National University of Singapore

View shared research outputs
Top Co-Authors

Avatar

Zheng Leong Chua

National University of Singapore

View shared research outputs
Top Co-Authors

Avatar

Atul Sadhu

National University of Singapore

View shared research outputs
Top Co-Authors

Avatar

Enrico Budianto

National University of Singapore

View shared research outputs
Top Co-Authors

Avatar

Hung Dang

National University of Singapore

View shared research outputs
Top Co-Authors

Avatar

Inian Parameshwaran

National University of Singapore

View shared research outputs
Top Co-Authors

Avatar

Viswesh Narayanan

National University of Singapore

View shared research outputs
Top Co-Authors

Avatar

Aquinas Hobor

National University of Singapore

View shared research outputs
Top Co-Authors

Avatar

Hong Hu

National University of Singapore

View shared research outputs
Researchain Logo
Decentralizing Knowledge