Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security 2016
DOI: 10.1145/2976749.2978395
|View full text |Cite
|
Sign up to set email alerts
|

A Systematic Analysis of the Juniper Dual EC Incident

Abstract: In December 2015, Juniper Networks announced multiple security vulnerabilities stemming from unauthorized code in ScreenOS, the operating system for their NetScreen VPN routers. The more sophisticated of these vulnerabilities was a passive VPN decryption capability, enabled by a change to one of the elliptic curve points used by the Dual EC pseudorandom number generator.In this paper, we describe the results of a full independent analysis of the ScreenOS randomness and VPN key establishment protocol subsystems… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
36
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
7
3

Relationship

1
9

Authors

Journals

citations
Cited by 59 publications
(36 citation statements)
references
References 24 publications
0
36
0
Order By: Relevance
“…Attackers changed the process for generating one of the random numbers in the encryption code, allowing them to decrypt sensitive traffic. 5 All of Juniper's customers were vulnerable.…”
Section: Attacks On Closed Source Softwarementioning
confidence: 99%
“…Attackers changed the process for generating one of the random numbers in the encryption code, allowing them to decrypt sensitive traffic. 5 All of Juniper's customers were vulnerable.…”
Section: Attacks On Closed Source Softwarementioning
confidence: 99%
“…For example, Matsumoto et al [50] focus on insider threats. Furthermore, national security agencies are reported to have bugged networking equipment [5] and networking vendors have left backdoors open [3,4,15], leading to additional threats.…”
Section: Related Workmentioning
confidence: 99%
“…They also attacked engineers at Belgacom, the largest ISP in Belgium, in order to gain access to traffic from its core routers [21]. An unknown adversary -thought to be a nation state -infiltrated Juniper Networks' code repository and inserted a cryptographic backdoor into the company's VPN products [9]. Similar operations could be used to access STEKs from high-value targets.…”
Section: The Stek As An Enabling Vectormentioning
confidence: 99%