Cryptography in the Wild: An Empirical Analysis of Vulnerabilities in Cryptographic Libraries

被引:0
|
作者
Blessing, Jenny [1 ]
Specter, Michael A. [2 ]
Weitzner, Daniel J. [3 ]
机构
[1] Univ Cambridge, Cambridge, England
[2] Georgia Inst Technol, Atlanta, GA USA
[3] MIT, Cambridge, MA USA
关键词
Cryptography; Vulnerabilities; Complexity; Cryptography Libraries;
D O I
10.1145/3634737.3657012
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security of the Internet and numerous other applications rests on a small number of open-source cryptographic libraries: A vulnerability in any one of them threatens to compromise a significant percentage of web traffic. Despite this potential for security impact, the characteristics and causes of vulnerabilities in cryptographic software are not well understood. In this work, we conduct the first systematic, longitudinal analysis of cryptographic libraries and the vulnerabilities they produce. We collect data from the National Vulnerability Database, individual project repositories and mailing lists, and other relevant sources for all widely used cryptographic libraries. In our investigation of the causes of these vulnerabilities, we find evidence of a correlation between the complexity of these libraries and their (in)security, empirically demonstrating the potential risks of bloated cryptographic codebases. Among our most interesting findings is that 48.4% of vulnerabilities in libraries written in C and C++ are either primarily caused or exacerbated by memory safety issues, indicating that systems-level bugs are a major contributor to security issues in these systems. Cryptographic design and implementation issues make up 27.5% of vulnerabilities across all libraries, with side-channel attacks providing a further 19.4%. We find substantial variation among core library components in both complexity levels and vulnerabilities produced: for instance, over one-third of vulnerabilities are located in implementations of the SSL/TLS protocols, providing actionable evidence for codebase quality and security improvements in these libraries.
引用
收藏
页码:605 / 620
页数:16
相关论文
共 50 条
  • [11] Resource-Aware Cryptography: An Analysis of Lightweight Cryptographic Primitives
    Rushad M.
    Nambiar A.
    Chandavarkar B.R.
    SN Computer Science, 2022, 3 (1)
  • [12] Study of Vulnerabilities in the Cryptography Algorithms
    Ahuja, Harjis
    Bapna, Ruchita
    Bhase, Gargee
    Shekokar, Narendra
    PERVASIVE COMPUTING AND SOCIAL NETWORKING, ICPCSN 2022, 2023, 475 : 65 - 76
  • [13] Forecasting IT security vulnerabilities - An empirical analysis
    Yasasin, Emrah
    Prester, Julian
    Wagner, Gerit
    Schryen, Guido
    COMPUTERS & SECURITY, 2020, 88
  • [14] An empirical analysis of vulnerabilities in virtualization technologies
    Gkortzis, Antonios
    Rizou, Stamatia
    Spinellis, Diomidis
    2016 8TH IEEE INTERNATIONAL CONFERENCE ON CLOUD COMPUTING TECHNOLOGY AND SCIENCE (CLOUDCOM 2016), 2016, : 533 - 538
  • [15] Relating cryptography and cryptographic protocols: A panel
    Scedrov, A
    14TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2001, : 111 - 111
  • [16] An Analysis of Speculative Type Confusion Vulnerabilities in the Wild
    Kirzner, Ofek
    Morrison, Adam
    PROCEEDINGS OF THE 30TH USENIX SECURITY SYMPOSIUM, 2021, : 2399 - 2416
  • [17] Cryptographic Algorithms in Wearable Communications: An Empirical Analysis
    Coelho, Kristtopher
    Damiao, Danilo
    Noubir, Guevara
    Borges, Alex
    Nogueira, Michele
    Nacif, Jose
    IEEE COMMUNICATIONS LETTERS, 2019, 23 (11) : 1931 - 1934
  • [18] An Empirical Analysis of Cryptographic Misuse on Different Platforms
    Zhang, Tian-lu
    Zhang, Yuan-yuan
    Wang, Hui
    Liu, Hui
    COMPUTER SCIENCE AND TECHNOLOGY (CST2016), 2017, : 316 - 324
  • [19] Implementation vulnerabilities in general quantum cryptography
    Huang, Anqi
    Barz, Stefanie
    Andersson, Erika
    Makarov, Vadim
    NEW JOURNAL OF PHYSICS, 2018, 20
  • [20] Neural Cryptography: Vulnerabilities and Attack Strategies
    Beshaj, Lubjana
    Tyagi, Gaurav
    DISRUPTIVE TECHNOLOGIES IN INFORMATION SCIENCES VIII, 2024, 13058