Analyzing Implementation-Based SSL/TLS Vulnerabilities with Binary Semantics Analysis

被引:0
|
作者
Wang, Li [1 ]
Yang, Yi [2 ]
Alavalapati, Goutham Reddy [1 ]
机构
[1] Fontbonne Univ, Clayton, MO 63105 USA
[2] NE Illinois Univ, Chicago, IL 60625 USA
关键词
SSL/TLS vulnerability; Program vulnerability analysis; Binary semantics analysis; Binary similarity comparison; Symbolic execution; Dynamic analysis; SOFTWARE; ATTACKS;
D O I
10.1007/978-3-031-64954-7_19
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
SSL/TLS are cryptographic protocols created to protect the security and privacy over computer network communication. As a critical security infrastructure on the internet, it has been widely used for decades in various network related applications, such as HTTPs, SMTPs, FTPs, and so on. Although it is designed to "protect" the network communication, it also has some security concerns. In this paper, we present the feasibility of analyzing implementation-based SSL/TLS vulnerabilities with binary semantics analysis. We use a basic-blocks-sequence based binary semantics comparison method to conduct vulnerability analysis on SSL/TLS vulnerabilities. We abstract a vulnerability execution trace as a "signature". By comparing the semantic similarity of a target program's execution trace and a vulnerability's "signature", we are able to detect whether the target program contains the vulnerability or not. We analyzed the well-known Heartbleed vulnerability and other implementation based vulnerabilities in representative network applications which use two popular SSL/TLS libraries, OpenSSL and mbedTLS. The evaluation result shows that our basic-blocks-sequence based binary semantics comparison method is effective on analyzing the existence of various implementation based SSL/TLS vulnerabilities.
引用
收藏
页码:371 / 394
页数:24
相关论文
共 12 条
  • [1] Navigating Through SSL/TLS Implementation Vulnerabilities in Vehicle-related iOS Apps
    Auerbach, Jacob M.
    Zhang, Linxi
    2024 IEEE 3RD INTERNATIONAL CONFERENCE ON COMPUTING AND MACHINE INTELLIGENCE, ICMI 2024, 2024,
  • [2] STACCO: Differentially Analyzing Side-Channel Traces for Detecting SSL/TLS Vulnerabilities in Secure Enclaves
    Xiao, Yuan
    Li, Mengyuan
    Chen, Sanchuan
    Zhang, Yinqian
    CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 859 - 874
  • [3] Identifying vulnerabilities of SSL/TLS certificate verification in Android apps with static and dynamic analysis
    Wang, Yingjie
    Xu, Guangquan
    Liu, Xing
    Mao, Weixuan
    Si, Chengxiang
    Pedrycz, Witold
    Wang, Wei
    JOURNAL OF SYSTEMS AND SOFTWARE, 2020, 167
  • [4] SSL/TLS-based secure tunnel gateway system design and implementation
    Chen, Jianhua
    Miao, Fang
    Wang, Quanhai
    2007 INTERNATIONAL WORKSHOP ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION, 2007, : 258 - +
  • [5] Efficient Implementation of Rigorous Coupled-Wave Analysis for Analyzing Binary Gratings
    Li, Jie
    Shi, Lihua
    Ma, Yao
    Sun, Zheng
    Zhang, Qi
    Fu, Shangchen
    Liu, Yicheng
    Ran, Yuzhou
    Wang, Jianbao
    IEEE ANTENNAS AND WIRELESS PROPAGATION LETTERS, 2020, 19 (12): : 2132 - 2135
  • [6] AJNA: Anti-Phishing JS']JS-based Visual Analysis, to Mitigate Users' Excessive Trust in SSL/TLS
    Mensah, Pernelle
    Blanc, Gregory
    Okada, Kazuya
    Miyamoto, Daisuke
    Kadobayashi, Youki
    2015 4TH INTERNATIONAL WORKSHOP ON BUILDING ANALYSIS DATASETS AND GATHERING EXPERIENCE RETURNS FOR SECURITY (BADGERS), 2015, : 74 - 84
  • [7] The constraint-based knowledge broker model: Semantics, implementation and analysis
    Andreoli, JM
    Borghoff, UM
    Pareschi, R
    JOURNAL OF SYMBOLIC COMPUTATION, 1996, 21 (4-6) : 635 - 667
  • [8] BinMatch: A Semantics-based Hybrid Approach on Binary Code Clone Analysis
    Hu, Yikun
    Zhang, Yuanyuan
    Li, Juanru
    Wang, Hui
    Li, Bodong
    Gu, Dawu
    PROCEEDINGS 2018 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME), 2018, : 104 - 114
  • [9] Efficient Implementation of the Binary Common Neighbor Analysis for Platinum-Based Intermetallics
    Tang, Wenming
    Zhang, Xianxian
    Tang, Jianfeng
    Zhang, Xingming
    Wang, Liang
    Hu, Wangyu
    Deng, Lei
    METALS, 2024, 14 (06)
  • [10] GrAMeFFSI: Graph Analysis Based Message Format and Field Semantics Inference For Binary Protocols, Using Recorded Network Traffic
    Ladi, Gergo
    Buttyan, Levente
    Holczer, Tamas
    INFOCOMMUNICATIONS JOURNAL, 2020, 12 (02): : 25 - 33