Cryptography in the Wild: An Empirical Analysis of Vulnerabilities in Cryptographic Libraries

被引:0
|
作者
Blessing, Jenny [1 ]
Specter, Michael A. [2 ]
Weitzner, Daniel J. [3 ]
机构
[1] Univ Cambridge, Cambridge, England
[2] Georgia Inst Technol, Atlanta, GA USA
[3] MIT, Cambridge, MA USA
关键词
Cryptography; Vulnerabilities; Complexity; Cryptography Libraries;
D O I
10.1145/3634737.3657012
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The security of the Internet and numerous other applications rests on a small number of open-source cryptographic libraries: A vulnerability in any one of them threatens to compromise a significant percentage of web traffic. Despite this potential for security impact, the characteristics and causes of vulnerabilities in cryptographic software are not well understood. In this work, we conduct the first systematic, longitudinal analysis of cryptographic libraries and the vulnerabilities they produce. We collect data from the National Vulnerability Database, individual project repositories and mailing lists, and other relevant sources for all widely used cryptographic libraries. In our investigation of the causes of these vulnerabilities, we find evidence of a correlation between the complexity of these libraries and their (in)security, empirically demonstrating the potential risks of bloated cryptographic codebases. Among our most interesting findings is that 48.4% of vulnerabilities in libraries written in C and C++ are either primarily caused or exacerbated by memory safety issues, indicating that systems-level bugs are a major contributor to security issues in these systems. Cryptographic design and implementation issues make up 27.5% of vulnerabilities across all libraries, with side-channel attacks providing a further 19.4%. We find substantial variation among core library components in both complexity levels and vulnerabilities produced: for instance, over one-third of vulnerabilities are located in implementations of the SSL/TLS protocols, providing actionable evidence for codebase quality and security improvements in these libraries.
引用
收藏
页码:605 / 620
页数:16
相关论文
共 50 条
  • [41] A Comparative Study on Design and Usability of Cryptographic Libraries
    Luo, Junwei
    Yang, Xuechao
    Yi, Xun
    Han, Fengling
    Gondal, Iqbal
    Huang, Guang-Bin
    PROCEEDINGS OF 2023 AUSTRALIAN COMPUTER SCIENCE WEEK, ACSW 2023, 2023, : 102 - 111
  • [42] sPECTRA: a Precise framEwork for analyzing CrypTographic vulneRabilities in Android apps
    Gajrani, Jyoti
    Tripathi, Meenakshi
    Laxmi, Vijay
    Gaur, M. S.
    Conti, Mauro
    Rajarajan, Muttukrishnan
    2017 14TH IEEE ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC), 2017, : 854 - 860
  • [43] Differential Testing of Cryptographic Libraries with Hybrid Fuzzing
    Jin, Hoyong
    An, Dohyeon
    Kwon, Taekyoung
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2022, 2023, 13849 : 124 - 144
  • [44] Exploiting Vulnerabilities in Cryptographic Hash Functions Based on Reconfigurable Hardware
    Cilardo, Alessandro
    Mazzocca, Nicola
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (05) : 810 - 820
  • [45] European digital libraries: web security vulnerabilities
    Kuzma, Joanne
    LIBRARY HI TECH, 2010, 28 (03) : 402 - 413
  • [46] Patch Release Behaviors of Software Vendors in Response to Vulnerabilities: An Empirical Analysis
    Temizkan, Orcun
    Kumar, Ram L.
    Park, SungJune
    Subramaniam, Chandrasekar
    JOURNAL OF MANAGEMENT INFORMATION SYSTEMS, 2012, 28 (04) : 305 - 337
  • [47] An Empirical Analysis on the Vulnerabilities of End-to-End Speech Segregation Models
    Parikh, Rahil
    Rochette, Gaspar
    Espy-Wilson, Carol
    Shamma, Shihab
    INTERSPEECH 2022, 2022, : 5408 - 5412
  • [48] Identifying vulnerabilities of quantum cryptography in secure optical data transport
    Kartalopoulos, Stamatios V.
    MILCOM 2005 - 2005 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-5, 2005, : 2788 - 2796
  • [49] An economical model for the risk evaluation of DoS vulnerabilities in cryptography protocols
    Cao, Zhen
    Guan, Zhi
    Chen, Zhong
    Hu, Jianbin
    Tang, Liyong
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2007, 4464 : 129 - +
  • [50] Discrete mathematics for strengthening multivariate polynomial cryptography by addressing vulnerabilities
    Mahajan, Ginika
    Tiwari, Sanjay
    Sharma, Rakesh
    Gupta, Rohit Kumar
    Dadheech, Pankaj
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2024, 27 (07): : 2123 - 2132