学位论文详细信息
Discover, Analyze, and Validate Attacks with Introspective Side Channels.
Introspective Side Channel;TCP Sequence Number Inference;Firewall Middleboxes;Cellular Networks;Computer Science;Engineering;Computer Science and Engineering
Qian, ZhiyunXie, Yinglian ;
University of Michigan
关键词: Introspective Side Channel;    TCP Sequence Number Inference;    Firewall Middleboxes;    Cellular Networks;    Computer Science;    Engineering;    Computer Science and Engineering;   
Others  :  https://deepblue.lib.umich.edu/bitstream/handle/2027.42/94037/zhiyunq_1.pdf?sequence=1&isAllowed=y
瑞士|英语
来源: The Illinois Digital Environment for Access to Learning and Scholarship
PDF
【 摘 要 】

Traditionally, the focus of security property ``confidentiality;;;; is on users;; data (or application-layer information) such as password and credit card numbers. However, as network systems grow in complexity, more sensitive andinternal state information is being maintained both within and external to the system, and therefore also subject to being leaked or inferred. One such example is that more features are being pushed to the middleboxes in the network which causes additional state to be kept. The leakage of such internal state can ultimately cause security breaches at the application layer.In the thesis, a systematically identification of unintentionally revealed internal network state and its impact are presented. A new class of sidechannels defined as introspective side channels are summarized that can leak such internal state. Such side channels in disguise only leak seemingly trivial information.The security analysis of the above problem consists of four steps: 1). Measurement (behavior characterization of a target system). 2). Identification of sensitive network and system state. 3). Identification of relevant introspective side channels. 4). Security analysis by connecting the sensitive network state and the relevant introspective side channels. Through these steps, techniques built on side channels are described which can enable a wide range of security applications to discover, analyze and validate both new and existing attacks. For instance, a sensitive TCP-related state kept on certain firewall middleboxes is discovered to facilitate TCP injection and hijacking attacks. More surprisingly, even without the middleboxes, similar attacks are still possible due to newly identified introspective side-channels on the hosts.

【 预 览 】
附件列表
Files Size Format View
Discover, Analyze, and Validate Attacks with Introspective Side Channels. 3767KB PDF download
  文献评价指标  
  下载次数:1次 浏览次数:4次