Cryptography in the Wild: An Empirical Analysis of Vulnerabilities in Cryptographic Libraries

被引:0
|
作者
Blessing, Jenny [1 ]
Specter, Michael A. [2 ]
Weitzner, Daniel J. [3 ]
机构
[1] Univ Cambridge, Cambridge, England
[2] Georgia Inst Technol, Atlanta, GA USA
[3] MIT, Cambridge, MA USA
关键词
Cryptography; Vulnerabilities; Complexity; Cryptography Libraries;
D O I
10.1145/3634737.3657012
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security of the Internet and numerous other applications rests on a small number of open-source cryptographic libraries: A vulnerability in any one of them threatens to compromise a significant percentage of web traffic. Despite this potential for security impact, the characteristics and causes of vulnerabilities in cryptographic software are not well understood. In this work, we conduct the first systematic, longitudinal analysis of cryptographic libraries and the vulnerabilities they produce. We collect data from the National Vulnerability Database, individual project repositories and mailing lists, and other relevant sources for all widely used cryptographic libraries. In our investigation of the causes of these vulnerabilities, we find evidence of a correlation between the complexity of these libraries and their (in)security, empirically demonstrating the potential risks of bloated cryptographic codebases. Among our most interesting findings is that 48.4% of vulnerabilities in libraries written in C and C++ are either primarily caused or exacerbated by memory safety issues, indicating that systems-level bugs are a major contributor to security issues in these systems. Cryptographic design and implementation issues make up 27.5% of vulnerabilities across all libraries, with side-channel attacks providing a further 19.4%. We find substantial variation among core library components in both complexity levels and vulnerabilities produced: for instance, over one-third of vulnerabilities are located in implementations of the SSL/TLS protocols, providing actionable evidence for codebase quality and security improvements in these libraries.
引用
收藏
页码:605 / 620
页数:16
相关论文
共 50 条
  • [1] An Empirical Study of Cryptographic Libraries for MPI Communications
    Naser, Abu
    Gavahi, Mohsen
    Wu, Cong
    Viet Tung Hoang
    Wang, Zhi
    Yuan, Xin
    2019 IEEE INTERNATIONAL CONFERENCE ON CLUSTER COMPUTING (CLUSTER), 2019, : 290 - 300
  • [2] Laughter in the Wild: A Study into DoS Vulnerabilities in YAML Libraries
    Rasheed, Shawn
    Dietrich, Jens
    Tahir, Amjed
    2019 18TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS/13TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (TRUSTCOM/BIGDATASE 2019), 2019, : 342 - 349
  • [3] Cryptographic design vulnerabilities
    Schneier, B
    COMPUTER, 1998, 31 (09) : 29 - +
  • [4] ON THE CRYPTOGRAPHIC SYSTEM VULNERABILITIES
    Unkasevic, Tomislav B.
    Peric, Miroslav V.
    Banjac, Zoran D.
    2015 23RD TELECOMMUNICATIONS FORUM TELFOR (TELFOR), 2015, : 110 - 113
  • [5] Cryptography and cryptographic protocols
    Goldreich, O
    DISTRIBUTED COMPUTING, 2003, 16 (2-3) : 177 - 199
  • [6] Cryptography and cryptographic protocols
    Oded Goldreich
    Distributed Computing, 2003, 16 : 177 - 199
  • [7] A Systematic Evaluation of Automated Tools for Side-Channel Vulnerabilities Detection in Cryptographic Libraries
    Geimer, Antoine
    Vergnolle, Matheo
    Recoules, Frederic
    Daniel, Lesly-Ann
    Bardin, Sebastien
    Maurice, Clementine
    PROCEEDINGS OF THE 2023 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, CCS 2023, 2023, : 1690 - 1704
  • [8] Cryptography Vulnerabilities on HackerOne
    Hazhirpasand, Mohammadreza
    Ghafari, Mohammad
    2021 IEEE 21ST INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS 2021), 2021, : 18 - 27
  • [9] Vulnerabilities of One Cryptographic Protocol
    Kop'ev, D. V.
    MOSCOW UNIVERSITY MATHEMATICS BULLETIN, 2009, 64 (01) : 44 - 45
  • [10] EMPIRICAL ANALYSIS OF SOME CRYPTOGRAPHIC ALGORITHMS
    Basu, S. K.
    Singh, Prahlad Kumar
    Sit, Somenath
    PROCEEDINGS OF THE FOURTH INTERNATIONAL CONFERENCE ON INTERNET TECHNOLOGIES AND APPLICATIONS (ITA 11), 2011, : 70 - 77