Title :
The Power of Evil Choices in Bloom Filters
Author :
Thomas Gerbet;Amrit Kumar;Cédric
Author_Institution :
Univ. Joseph Fourier, Grenoble, France
fDate :
6/1/2015 12:00:00 AM
Abstract :
A Bloom filter is a probabilistic hash-based data structure extensively used in software including online security applications. This paper raises the following important question: Are Bloom filters correctly designed in a security context? The answer is no and the reasons are multiple: bad choices of parameters, lack of adversary models and misused hash functions. Indeed, developers truncate cryptographic digests without a second thought on the security implications. This work constructs adversary models for Bloom filters and illustrates attacks on three applications, namely SCRAPY web spider, BITLY DABLOOMS spam filter and SQUID cache proxy. As a general impact, filters are forced to systematically exhibit worst-case behavior. One of the reasons being that Bloom filter parameters are always computed in the average case. We compute the worst-case parameters in adversarial settings, show how to securely and efficiently use cryptographic hash functions and propose several other countermeasures to mitigate our attacks.
Keywords :
"Cryptography","Electronic mail","Data structures","Indexes","Software","Complexity theory"
Conference_Titel :
Dependable Systems and Networks (DSN), 2015 45th Annual IEEE/IFIP International Conference on
DOI :
10.1109/DSN.2015.21