Proceedings of the 2012 ACM Conference on Computer and Communications Security 2012
DOI: 10.1145/2382196.2382204
|View full text |Cite
|
Sign up to set email alerts
|

The most dangerous code in the world

Abstract: SSL (Secure Sockets Layer) is the de facto standard for secure Internet communications. Security of SSL connections against an active network attacker depends on correctly validating public-key certificates presented when the connection is established.We demonstrate that SSL certificate validation is completely broken in many security-critical applications and libraries. Vulnerable software includes Amazon's EC2 Java library and all cloud clients based on it; Amazon's and PayPal's merchant SDKs responsible for… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

1
33
0
2

Year Published

2016
2016
2020
2020

Publication Types

Select...
4
3
3

Relationship

0
10

Authors

Journals

citations
Cited by 320 publications
(36 citation statements)
references
References 7 publications
1
33
0
2
Order By: Relevance
“…By being able to repeat a test automatically, it was possible to issue different secure sockets layer (SSL) certificates to find out whether the client validated them correctly. These or similar test scenarios are also found in other relevant research [22,31]. This led to the incorporation of similar tests into the research presented in this paper.…”
Section: Introductionsupporting
confidence: 74%
“…By being able to repeat a test automatically, it was possible to issue different secure sockets layer (SSL) certificates to find out whether the client validated them correctly. These or similar test scenarios are also found in other relevant research [22,31]. This led to the incorporation of similar tests into the research presented in this paper.…”
Section: Introductionsupporting
confidence: 74%
“…One core problem is that revocation checks in browsers are not comprehensive: Chrome generally does not verify revocations, its CRLSet is limited to emergency revocations by design [48], and Mozilla's Firefox similarly limits revocation checks through OneCRL to CA intermediate certificates [49]. Certificate revocations in other software and libraries, which rely on the same certificate issuance processes and would also be required to adopt the new revocation checks, are rarely checked in practice [50]. Furthermore, revocations are reactive by nature and they provide a window of opportunity to an attacker by design: the time until the revocation has propagated plus the time until the attacker's certificate has been revoked by the issuing CA on request of the legitimate party, the latter of which is generally a manual process as additional verification is required.…”
Section: Mitigationmentioning
confidence: 99%
“…Many applications that use encryption or other cryptographic services end up being vulnerable because their developers knowingly or unknowingly misuse cryptographic libraries [3,4,5,6]. While the cryptographic algorithms themselves may not contain severe bugs, their application programming interfaces (APIs) are not resistant to misuse and in some cases they are very difficult to use at all without detailed cryptographic knowledge.…”
Section: Introductionmentioning
confidence: 99%