Achieving Consistency of Software Updates against Strong Attackers

被引:1
作者
Abdullah, Lamya [1 ]
Hahn, Sebastian [2 ]
Freiling, Felix [2 ]
机构
[1] Friedrich Alexander Univ Erlangen Nurnberg FAU, Uniscon GmbH, Erlangen, Germany
[2] Friedrich Alexander Univ Erlangen Nurnberg FAU, Erlangen, Germany
来源
THIRD CENTRAL EUROPEAN CYBERSECURITY CONFERENCE (CECC 2019) | 2019年
基金
欧盟地平线“2020”;
关键词
malicious software update; consistency; update attacks;
D O I
10.1145/3360664.3360670
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Update systems regularly distribute updates for installed software to end users. Problems arise when the update system is misused and malicious updates are sent to a small set of users only. Such situations can occur if the software supplier has been successfully attacked or is coerced by government agencies to distribute hand-crafted updates containing promiscuous functionality like backdoors. In this paper, we define a set of general security requirements for update systems that encompass protection against malicious updates. We then introduce the design of an update system that satisfies the requirements and present an implementation as an extension to the advanced package tool (APT) for the Debian OS. We evaluate the strengths and weaknesses of the system and discuss its large-scale applicability with respect to security and performance overhead.
引用
收藏
页数:6
相关论文
共 19 条
[1]  
[Anonymous], 2016, 9 WORKSH HOT TOP PRI
[2]  
[Anonymous], 2004, TECHNICAL REPORT
[3]  
[Anonymous], 2017, DEBIAN POLICY MANUAL
[4]  
[Anonymous], 2017, UPDATE FRAMEWORK PRO
[5]  
[Anonymous], 2017, RUST
[6]  
[Anonymous], 2019, SHADOWHAMMER MALICIO
[7]  
Bernstein P.A., 1987, Concurrency Control and Recovery in Database Systems, VVolume 370
[8]  
Durumeric Zakir, 2013, P 2013 C INT MEAS C, DOI [10.1145/2504730.2504755, DOI 10.1145/2504730.2504755]
[9]   Hey, NSA: Stay Away from my Market! Future Proofing App Markets against Powerful Attackers [J].
Fahl, Sascha ;
Dechand, Serge ;
Perl, Henning ;
Fischer, Felix ;
Smrcek, Jaromir ;
Smith, Matthew .
CCS'14: PROCEEDINGS OF THE 21ST ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2014, :1143-1155
[10]  
Gallagher Ryan, 2014, THE INTERCEPT, V12