Off-Path TCP Exploit: How Wireless Routers Can Jeopardize Your Secrets

被引:0
|
作者
Chen, Weiteng [1 ]
Qian, Zhiyun [1 ]
机构
[1] Univ Calif Riverside, Riverside, CA 92521 USA
基金
美国国家科学基金会;
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this study, we discover a subtle yet serious timing side channel that exists in all generations of half-duplex IEEE 802.11 or Wi-Fi technology. Previous TCP injection attacks stem from software vulnerabilities which can be easily eliminated via software update, but the side channel we report is rooted in the fundamental design of IEEE 802.11 protocols. This design flaw means it is impossible to eliminate the side channel without substantial changes to the specification. By studying the TCP stacks of modern operating systems and their potential interactions with the side channel, we can construct reliable and practical off-path TCP injection attacks against the latest versions of all three major operating systems (macOS, Windows, and Linux). Our attack only requires a device connected to the Internet via a wireless router, and be reachable from an attack server (e.g., indirectly so by accessing to a malicious website). Among possible attacks scenarios, such as inferring the presence of connections and counting exchanged bytes, we demonstrate a particular threat where an off-path attacker can poison the web cache of an unsuspecting user within minutes (as fast as 30 seconds) under realistic network conditions.
引用
收藏
页码:1581 / 1598
页数:18
相关论文
共 27 条
  • [1] Off-Path TCP Injection Attacks
    Gilad, Yossi
    Herzberg, Amir
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2014, 16 (04)
  • [2] Off-Path TCP Exploits of the Mixed IPID Assignment
    Feng, Xuewei
    Fu, Chuanpu
    Li, Qi
    Sun, Kun
    Xu, Ke
    CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2020, : 1323 - 1335
  • [3] Off-Path TCP Sequence Number Inference Attack How Firewall Middleboxes Reduce Security
    Qian, Zhiyun
    Mao, Z. Morley
    2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2012, : 347 - 361
  • [4] Off-Path TCP Exploits: Global Rate Limit Considered Dangerous
    Cao, Yue
    Qian, Zhiyun
    Wang, Zhongjie
    Dao, Tuan
    Krishnamurthy, Srikanth V.
    Marvel, Lisa M.
    PROCEEDINGS OF THE 25TH USENIX SECURITY SYMPOSIUM, 2016, : 209 - 225
  • [5] Off-Path TCP Exploits of the Challenge ACK Global Rate Limit
    Cao, Yue
    Qian, Zhiyun
    Wang, Zhongjie
    Dao, Tuan
    Krishnamurthy, Srikanth V.
    Marvel, Lisa M.
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2018, 26 (02) : 765 - 778
  • [6] Off-Path TCP Hijacking Attacks via the Side Channel of Downgraded IPID
    Feng, Xuewei
    Li, Qi
    Sun, Kun
    Fu, Chuanpu
    Xu, Ke
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2022, 30 (01) : 409 - 422
  • [7] ONIS: Inferring TCP/IP-based Trust Relationships Completely Off-Path
    Zhang, Xu
    Knockel, Jeffrey
    Crandall, Jedidiah R.
    IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2018), 2018, : 2078 - 2086
  • [8] Off-Path Round Trip Time Measurement via TCP/IP Side Channels
    Alexander, Geoffrey
    Crandall, Jedidiah R.
    2015 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM), 2015,
  • [9] Exploiting Cross-Layer Vulnerabilities: Off-Path Attacks on the TCP/IP Protocol Suite
    Feng, Xuewei
    Li, Qi
    Sun, Kun
    Xu, Ke
    Wu, Jianping
    COMMUNICATIONS OF THE ACM, 2025, 68 (03) : 48 - 59
  • [10] Off-Path TCP Hijacking in Wi-Fi Networks: A Packet-Size Side Channel Attack
    Wang, Ziqiang
    Feng, Xuewei
    Li, Qi
    Sun, Kun
    Yang, Yuxiang
    Li, Mengyuan
    Du, Ganqiu
    Xu, Ke
    Wu, Jianping
    arXiv,