Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security 2016
DOI: 10.1145/2976749.2978411
|View full text |Cite
|
Sign up to set email alerts
|

Systematic Fuzzing and Testing of TLS Libraries

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
45
0
2

Year Published

2017
2017
2022
2022

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 81 publications
(47 citation statements)
references
References 20 publications
0
45
0
2
Order By: Relevance
“…Many padding oracle attacks have surfaced over the years, ranging from attacks exploiting straightforward issues (such as implementations sending padding error alerts after decryption) to more advanced attacks using side channels (such as Lucky13 [1] or POODLE [40]). Even though padding oracle attacks are well known, they remain difficult to prevent in TLS implementations and new variants tend to appear regularly [48]. The CBC mode of operation is also not secure against chosen-plaintext attacks when the IV is predictable (as in TLS 1.0), which is exploited in the BEAST attack [22].…”
Section: Introductionmentioning
confidence: 99%
“…Many padding oracle attacks have surfaced over the years, ranging from attacks exploiting straightforward issues (such as implementations sending padding error alerts after decryption) to more advanced attacks using side channels (such as Lucky13 [1] or POODLE [40]). Even though padding oracle attacks are well known, they remain difficult to prevent in TLS implementations and new variants tend to appear regularly [48]. The CBC mode of operation is also not secure against chosen-plaintext attacks when the IV is predictable (as in TLS 1.0), which is exploited in the BEAST attack [22].…”
Section: Introductionmentioning
confidence: 99%
“…It prepares encrypted packets with specified plaintext or ciphertext (with specified errors) to be sent to the peer at any stage of an SSL/TLS connection. In our implementation, we adopted an open-source tool, TLS-attacker [67]. It is able to complete an SSL/TLS handshake or replace any packet in this process.…”
Section: Differential Analysis Frameworkmentioning
confidence: 99%
“…Unlike GnuTLS, OpenSSL does not have enclave-illegal instructions and can be loaded and ran directly by an SSL/TLS server as sgx.trusted_files in the enclave with Graphene. To complete the attack, we extended the opensource tool, TLS-Attacker [66], and implemented an add-on module. We chose TLS-Attacker because it enables us to easily replace the ClientKeyExchange message with any message we would like the oracle to test.…”
Section: Bleichenbacher Attacksmentioning
confidence: 99%
“…The identified bugs were classified as state machine bugs and this put the internal state machines of TLS implementations into the focus, next to and on the same level of criticality as the implementation of pure cryptographic functionality. The systematic testing of TLS implementations based on the principles of these kind of state machine bugs with a tool was presented in [32] and offers the user the possibility to create custom TLS message flows and arbitrarily modify message contents. The strategy for testing of TLS implementations via the exchange of modified messages or injection attacks was also followed in [28] and [12].…”
Section: Related Workmentioning
confidence: 99%