Analyzing Implementation-Based SSL/TLS Vulnerabilities with Binary Semantics Analysis

被引:0
作者
Wang, Li [1 ]
Yang, Yi [2 ]
Alavalapati, Goutham Reddy [1 ]
机构
[1] Fontbonne Univ, Clayton, MO 63105 USA
[2] NE Illinois Univ, Chicago, IL 60625 USA
来源
SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, PT II, SECURECOMM 2023 | 2025年 / 568卷
关键词
SSL/TLS vulnerability; Program vulnerability analysis; Binary semantics analysis; Binary similarity comparison; Symbolic execution; Dynamic analysis; SOFTWARE; ATTACKS;
D O I
10.1007/978-3-031-64954-7_19
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
SSL/TLS are cryptographic protocols created to protect the security and privacy over computer network communication. As a critical security infrastructure on the internet, it has been widely used for decades in various network related applications, such as HTTPs, SMTPs, FTPs, and so on. Although it is designed to "protect" the network communication, it also has some security concerns. In this paper, we present the feasibility of analyzing implementation-based SSL/TLS vulnerabilities with binary semantics analysis. We use a basic-blocks-sequence based binary semantics comparison method to conduct vulnerability analysis on SSL/TLS vulnerabilities. We abstract a vulnerability execution trace as a "signature". By comparing the semantic similarity of a target program's execution trace and a vulnerability's "signature", we are able to detect whether the target program contains the vulnerability or not. We analyzed the well-known Heartbleed vulnerability and other implementation based vulnerabilities in representative network applications which use two popular SSL/TLS libraries, OpenSSL and mbedTLS. The evaluation result shows that our basic-blocks-sequence based binary semantics comparison method is effective on analyzing the existence of various implementation based SSL/TLS vulnerabilities.
引用
收藏
页码:371 / 394
页数:24
相关论文
共 65 条
  • [21] ietf, Secure Sockets Layer Version 3.0
  • [22] ietf, Transportation Layer Security Version 1.3
  • [23] Program Characterization Using Runtime Values and Its Application to Software Plagiarism Detection
    Jhi, Yoon-Chan
    Jia, Xiaoqi
    Wang, Xinran
    Zhu, Sencun
    Liu, Peng
    Wu, Dinghao
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2015, 41 (09) : 925 - 943
  • [24] Jhi YC, 2011, 2011 33RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), P756, DOI 10.1145/1985793.1985899
  • [25] Pixy: A static analysis tool for detecting Web application vulnerabilities - (Short paper)
    Jovanovic, Nenad
    Kruegel, Christopher
    Kirda, Engin
    [J]. 2006 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2006, : 258 - +
  • [26] Malware classification based on call graph clustering
    Kinable, Joris
    Kostakis, Orestis
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2011, 7 (04): : 233 - 245
  • [27] Lannan Luo, 2016, 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). Proceedings, P550, DOI 10.1109/DSN.2016.56
  • [28] Large-Scale Third-Party Library Detection in Android Markets
    Li, Menghao
    Wang, Pei
    Wang, Wei
    Wang, Shuai
    Wu, Dinghao
    Liu, Jian
    Xue, Rui
    Huo, Wei
    Zou, Wei
    [J]. IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2020, 46 (09) : 981 - 1003
  • [29] LibD: Scalable and Precise Third-party Library Detection in Android Markets
    Li, Menghao
    Wang, Wei
    Wang, Pei
    Wang, Shuai
    Wu, Dinghao
    Liu, Jian
    Xue, Rui
    Huo, Wei
    [J]. 2017 IEEE/ACM 39TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), 2017, : 335 - 346
  • [30] Software Vulnerability Discovery Techniques: A Survey
    Liu, Bingchang
    Shi, Liang
    Cai, Zhuhua
    Li, Min
    [J]. 2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 152 - 156