Title
A System To Verify Network Behavior Of Known Cryptographic Clients
Abstract
Numerous exploits of client-server protocols and applications involve modifying clients to behave in ways that untampered clients would not, such as crafting malicious packets. In this paper, we develop a system for verifying in near real-time that a cryptographic client's message sequence is consistent with its known implementation. Moreover, we accomplish this without knowing all of the client-side inputs driving its behavior. Our toolchain for verifying a client's messages explores multiple candidate execution paths in the client concurrently, an innovation useful for aspects of certain cryptographic protocols such as message padding (which will be permitted in TLS 1.3). In addition, our toolchain includes a novel approach to symbolically executing the client software in multiple passes that defers expensive functions until their inputs can be inferred and concretized. We demonstrate client verification on OpenSSL and BoringSSL to show that, e.g., Heartbleed exploits can be detected without Heartbleed-specific filtering and within seconds of the first malicious packet. On legitimate traffic our verification keeps pace with Gmail-shaped workloads, with a median lag of 0.85s.
Year
Venue
Field
2017
PROCEEDINGS OF NSDI '17: 14TH USENIX SYMPOSIUM ON NETWORKED SYSTEMS DESIGN AND IMPLEMENTATION
Cryptographic protocol,Cryptography,Computer science,Cryptographic primitive,Network behavior,Distributed computing
DocType
Citations 
PageRank 
Conference
2
0.36
References 
Authors
12
5
Name
Order
Citations
PageRank
Andrew Chi1102.38
Robert A. Cochran2131.31
Marie Nesfield320.36
Michael K. Reiter48695764.03
Cynthia Sturton5858.56