Automated Detection of Side Channels in Cryptographic Protocols: DROWN the ROBOTs!

被引:3
作者
Drees, Jan Peter [1 ]
Gupta, Pritha [2 ]
Huellermeier, Eyke [3 ]
Jager, Tibor [1 ]
Konze, Alexander [4 ]
Priesterjahn, Claudia [4 ]
Ramaswamy, Arunselvan [2 ]
Somorovsky, Juraj [2 ]
机构
[1] Univ Wuppertal, Wuppertal, Germany
[2] Paderborn Univ, Paderborn, Germany
[3] Ludwig Maximilians Univ Munchen, Munich, Germany
[4] Achelos GmbH, Paderborn, Germany
来源
PROCEEDINGS OF THE 14TH ACM WORKSHOP ON ARTIFICIAL INTELLIGENCE AND SECURITY, AISEC 2021 | 2021年
基金
欧洲研究理事会;
关键词
Bleichenbacher; side channel; TLS; machine learning;
D O I
10.1145/3474369.3486868
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Currently most practical attacks on cryptographic protocols like TLS are based on side channels, such as padding oracles. Some well-known recent examples are DROWN, ROBOT and Raccoon (USENIX Security 2016, 2018, 2021). Such attacks are usually found by careful and time-consuming manual analysis by specialists. In this paper, we consider the question of how such attacks can be systematically detected and prevented before (large-scale) deployment. We propose a new, fully automated approach, which uses supervised learning to identify arbitrary patterns in network protocol traffic. In contrast to classical scanners, which search for known side channels, the detection of general patterns might detect new side channels, even "unexpected" ones, such as those from the ROBOT attack. To analyze this approach, we develop a tool to detect Bleichenbacher-like padding oracles in TLS server implementations, based on an ensemble of machine learning algorithms. We verify that the approach indeed detects known vulnerabilities successfully and reliably. The tool also provides detailed information about detected patterns to developers, to assist in removing a potential padding oracle. Due to the automation, the approach scales much better than manual analysis and could even be integrated with a CI/CD pipeline of a development environment, for example.
引用
收藏
页码:169 / 180
页数:12
相关论文
共 39 条
[1]  
[Anonymous], 2021, 30 USENIX SECURITY S
[2]  
Aviram N, 2016, PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, P689
[3]  
Bardou R, 2012, LECT NOTES COMPUT SC, V7417, P608
[4]  
Beck G, 2020, PROCEEDINGS OF THE 29TH USENIX SECURITY SYMPOSIUM, P1821
[5]  
Bleichenbacher D, 1998, LECT NOTES COMPUT SC, V1462, P1, DOI 10.1007/BFb0055716
[6]  
Böck H, 2018, PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, P817
[7]  
Carbone M., 2019, IACR Trans. Cryptogr. Hardw. Embed. Syst., V2019, P132, DOI DOI 10.13154/TCHES.V2019.I2.132-161
[8]  
Degabriele JP, 2012, LECT NOTES COMPUT SC, V7178, P116, DOI 10.1007/978-3-642-27954-6_8
[9]  
Dierks Tim, 2008, TRANSPORT LAYER SECU
[10]  
Felsch Dennis, 2018, P 27 US SEC S, P18