The Power of Evil Choices in Bloom Filters - Inria - Institut national de recherche en sciences et technologies du numérique Accéder directement au contenu
Communication Dans Un Congrès Année : 2015

The Power of Evil Choices in Bloom Filters

Résumé

A Bloom filter is a probabilistic hash-based data structure extensively used in software including online security applications. This paper raises the following important question: Are Bloom filters correctly designed in a security context? The answer is no and the reasons are multiple: bad choices of parameters, lack of adversary models and misused hash functions. Indeed, developers truncate cryptographic digests without a second thought on the security implications. This work constructs adversary models for Bloom filters and illustrates attacks on three applications, namely Scrapy web spider, Bitly Dablooms spam filter and Squid cache proxy. As a general impact, filters are forced to systematically exhibit worst-case behavior. One of the reasons being that Bloom filter parameters are always computed in the average case. We compute the worst-case parameters in adversarial settings, show how to securely and efficiently use cryptographic hash functions and propose several other countermeasures to mitigate our attacks.
Fichier non déposé

Dates et versions

hal-01199150 , version 1 (15-09-2015)

Identifiants

  • HAL Id : hal-01199150 , version 1

Citer

Thomas Gerbet, Amrit Kumar, Cédric Lauradoux. The Power of Evil Choices in Bloom Filters. Annual IEEE/IFIP International Conference on Dependable Systems and Networks - DSN 2015, Jun 2015, Rio De Janeiro, Brazil. ⟨hal-01199150⟩
130 Consultations
0 Téléchargements

Partager

Gmail Facebook X LinkedIn More