Cheesecloth: Zero-Knowledge Proofs of Real-World Vulnerabilities

被引:0
|
作者
Cuellar, Santiago [1 ]
Harris, Bill [1 ]
Parker, James [1 ]
Pernsteiner, Stuart [1 ]
Tromer, Eran [2 ]
机构
[1] Galois Inc, Portland, OR 97204 USA
[2] Columbia Univ, New York, NY USA
来源
PROCEEDINGS OF THE 32ND USENIX SECURITY SYMPOSIUM | 2023年
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Currently, when a security analyst discovers a vulnerability in critical software system, they must navigate a fraught dilemma: immediately disclosing the vulnerability to the public could harm the system's users; whereas disclosing the vulnerability only to the software's vendor lets the vendor disregard or deprioritize the security risk, to the detriment of unwittingly-affected users. A compelling recent line of work aims to resolve this by using Zero Knowledge (ZK) protocols that let analysts prove that they know a vulnerability in a program, without revealing the details of the vulnerability or the inputs that exploit it. In principle, this could be achieved by generic ZK techniques. In practice, ZK vulnerability proofs to date have been restricted in scope and expressibility, due to challenges related to generating proof statements that model real-world software at scale and to directly formulating violated properties. This paper presents CHEESECLOTH, a novel proof-statement compiler, which proves practical vulnerabilities in ZK by soundly-but-aggressively preprocessing programs on public inputs, selectively revealing information about executed control segments, and formalizing information leakage using a novel storage-labeling scheme. CHEESECLOTH's practicality is demonstrated by generating ZK proofs of well-known vulnerabilities in (previous versions of) critical software, including the Heartbleed information leakage in OpenSSL and a memory vulnerability in the FFmpeg multi-media encoding framework.
引用
收藏
页码:6525 / 6540
页数:16
相关论文
共 50 条
  • [1] ZERO-KNOWLEDGE PROOFS
    MCGEOCH, CC
    AMERICAN MATHEMATICAL MONTHLY, 1993, 100 (07): : 682 - 685
  • [2] ZERO-KNOWLEDGE PROOFS
    WAYNER, P
    BYTE, 1987, 12 (11): : 149 - 152
  • [3] ON THE KNOWLEDGE TIGHTNESS OF ZERO-KNOWLEDGE PROOFS
    ITOH, T
    KAWAKUBO, A
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1994, E77A (01) : 47 - 55
  • [4] Zero-knowledge proofs of retrievability
    Yan Zhu
    HuaiXi Wang
    ZeXing Hu
    Gail-Joon Ahn
    HongXin Hu
    Science China Information Sciences, 2011, 54 : 1608 - 1617
  • [5] Zero-knowledge proofs of retrievability
    Zhu Yan
    Wang HuaiXi
    Hu ZeXing
    Ahn, Gail-Joon
    Hu HongXin
    SCIENCE CHINA-INFORMATION SCIENCES, 2011, 54 (08) : 1608 - 1617
  • [6] Zero-knowledge proofs of retrievability
    AHN Gail-Joon
    Science China(Information Sciences), 2011, 54 (08) : 1608 - 1617
  • [7] Zero-knowledge proofs of identity
    Feige, Uriel
    Fiat, Amos
    Shamir, Adi
    Journal of Cryptology, 1988, 1 (02) : 77 - 94
  • [8] Unifying Zero-Knowledge Proofs of Knowledge
    Maurer, Ueli
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2009, 2009, 5580 : 272 - 286
  • [9] Efficient Zero-Knowledge Proofs
    Groth, Jens
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2011, 2011, 6737 : 379 - 379
  • [10] A Survey on Zero-Knowledge Proofs
    Feng, Li
    McMillin, Bruce
    ADVANCES IN COMPUTERS, VOL 94, 2014, 94 : 25 - 69