Analyzing Implementation-Based SSL/TLS Vulnerabilities with Binary Semantics Analysis

被引:0
作者
Wang, Li [1 ]
Yang, Yi [2 ]
Alavalapati, Goutham Reddy [1 ]
机构
[1] Fontbonne Univ, Clayton, MO 63105 USA
[2] NE Illinois Univ, Chicago, IL 60625 USA
来源
SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, PT II, SECURECOMM 2023 | 2025年 / 568卷
关键词
SSL/TLS vulnerability; Program vulnerability analysis; Binary semantics analysis; Binary similarity comparison; Symbolic execution; Dynamic analysis; SOFTWARE; ATTACKS;
D O I
10.1007/978-3-031-64954-7_19
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
SSL/TLS are cryptographic protocols created to protect the security and privacy over computer network communication. As a critical security infrastructure on the internet, it has been widely used for decades in various network related applications, such as HTTPs, SMTPs, FTPs, and so on. Although it is designed to "protect" the network communication, it also has some security concerns. In this paper, we present the feasibility of analyzing implementation-based SSL/TLS vulnerabilities with binary semantics analysis. We use a basic-blocks-sequence based binary semantics comparison method to conduct vulnerability analysis on SSL/TLS vulnerabilities. We abstract a vulnerability execution trace as a "signature". By comparing the semantic similarity of a target program's execution trace and a vulnerability's "signature", we are able to detect whether the target program contains the vulnerability or not. We analyzed the well-known Heartbleed vulnerability and other implementation based vulnerabilities in representative network applications which use two popular SSL/TLS libraries, OpenSSL and mbedTLS. The evaluation result shows that our basic-blocks-sequence based binary semantics comparison method is effective on analyzing the existence of various implementation based SSL/TLS vulnerabilities.
引用
收藏
页码:371 / 394
页数:24
相关论文
共 65 条
  • [1] [Anonymous], 2012, P 15 ANN INT C INF S
  • [2] Aviram N, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P689
  • [3] Bard G.V., 2004, IACR Cryptology ePrint Archive, V2004
  • [4] Vulnerability Assessment in Autonomic Networks and Services: A Survey
    Barrere, Martin
    Badonnel, Remi
    Festor, Olivier
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (02): : 988 - 1004
  • [5] Bleichenbacher D, 1998, LECT NOTES COMPUT SC, V1462, P1, DOI 10.1007/BFb0055716
  • [6] Brown P. F., 1992, Computational Linguistics, V18, P467
  • [7] Input Generation via Decomposition and Re-Stitching: Finding Bugs in Malware
    Caballero, Juan
    Poosankam, Pongsin
    McCamant, Stephen
    Babic, Domagoj
    Song, Dawn
    [J]. PROCEEDINGS OF THE 17TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'10), 2010, : 413 - 425
  • [8] Postcards from the Post-HTTP World: Amplification of HTTPS Vulnerabilities in the Web Ecosystem
    Calzavara, Stefano
    Focardi, Riccardo
    Nemec, Matus
    Rabitti, Alvise
    Squarcina, Marco
    [J]. 2019 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2019), 2019, : 281 - 298
  • [9] Clause J., 2007, ISSTA 07, P196, DOI 10.1145/1273463.1273490
  • [10] Static detection of vulnerabilities in x86 executables
    Cova, Marco
    Felmetsger, Viktoria
    Banks, Greg
    Vigna, Giovanni
    [J]. 22ND ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2006, : 269 - +