Static Detection of Packet Injection Vulnerabilities - A Case for Identifying Attacker-controlled Implicit Information Leaks

被引:18
作者
Chen, Qi Alfred [1 ]
Qian, Zhiyun [2 ]
Jia, Yunhan Jack [1 ]
Shao, Yuru [1 ]
Mao, Z. Morley [1 ]
机构
[1] Univ Michigan, Ann Arbor, MI 48109 USA
[2] Univ Calif Riverside, Riverside, CA 92521 USA
来源
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY | 2015年
基金
美国国家科学基金会;
关键词
Network protocol security; Implicit information leakage; Static analysis; Side channel detection;
D O I
10.1145/2810103.2813643
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Off-path packet injection attacks are still serious threats to the Internet and network security. In recent years, a number of studies have discovered new variations of packet injection attacks, targeting critical protocols such as TCP. We argue that such recurring problems need a systematic solution. In this paper, we design and implement PacketGuardian, a precise static taint analysis tool that comprehensively checks the packet handling logic of various network protocol implementations. The analysis operates in two steps. First, it identifies the critical paths and constraints that lead to accepting an incoming packet. If paths with weak constraints exist, a vulnerability may be revealed immediately. Otherwise, based on "secret" protocol states in the constraints, a subsequent analysis is performed to check whether such states can be leaked to an attacker. In the second step, observing that all previously reported leaks are through implicit flows, our tool supports implicit flow tainting, which is a commonly excluded feature due to high volumes of false alarms caused by it. To address this challenge, we propose the concept of attacker-controlled implicit information leaks, and prioritize our tool to detect them, which effectively reduces false alarms without compromising tool effectiveness. We use PacketGuardian on 6 popular protocol implementations of TCP, SCTP, DCCP, and RTP, and uncover new vulnerabilities in Linux kernel TCP as well as 2 out of 3 R'I'P implementations. We validate these vulnerabilities and confirm that they are indeed highly exploitable.
引用
收藏
页码:388 / 400
页数:13
相关论文
共 58 条
[31]   Last-Level Cache Side-Channel Attacks are Practical [J].
Liu, Fangfei ;
Yarom, Yuval ;
Ge, Qian ;
Heiser, Gernot ;
Lee, Ruby B. .
2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015, 2015, :605-622
[32]  
Luo X, 2011, NDSS
[33]  
Meyer C., 2014, USENIX SECURITY
[34]  
Muller B., Whitepaper: Improved DNS Spoofing Using Node Re-delegation
[35]  
Necula G. C., 2002, CC
[36]  
Pedrosa L., 2015, NSDI
[37]  
Qian Z., 2012, CCS
[38]  
QIAN Z., 2012, IEEE S SEC PRIV
[39]  
RAMAIAH ANANTHA, 2010, RFC5961
[40]  
Rane Ashay, 2015, USENIX SECURITY