From IP ID to Device ID and KASLR Bypass (Extended Version)

06/25/2019
by   Amit Klein, et al.
0

IP headers include a 16-bit ID field. Our work examines the generation of this field in Windows (versions 8 and higher), Linux and Android, and shows that the IP ID field enables remote servers to assign a unique ID to each device and thus be able to identify subsequent transmissions sent from that device. This identification works across all browsers and over network changes. In modern Linux and Android versions, this field leaks a kernel address, thus we also break KASLR. Our work includes reverse-engineering of the Windows IP ID generation code, and a cryptanalysis of this code and of the Linux kernel IP ID generation code. It provides practical techniques to partially extract the key used by each of these algorithms, overcoming different implementation issues, and observing that this key can identify individual devices. We deployed a demo (for Windows) showing that key extraction and machine fingerprinting works in the wild, and tested it from networks around the world.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/14/2020

Cross Layer Attacks and How to Use Them (for DNS Cache Poisoning, Device Tracking and More)

We analyze the prandom pseudo random number generator (PRNG) in use in t...
research
09/26/2022

Device Tracking via Linux's New TCP Source Port Selection Algorithm (Extended Version)

We describe a tracking technique for Linux devices, exploiting a new TCP...
research
01/21/2021

An Efficient Communication Protocol for FPGA IP Protection

We introduce a protection-based IP security scheme to protect soft and f...
research
06/04/2020

FastReID: A Pytorch Toolbox for Real-world Person Re-identification

We present FastReID, as a widely used object re-identification (re-id) s...
research
10/06/2020

Dissecting Span Identification Tasks with Performance Prediction

Span identification (in short, span ID) tasks such as chunking, NER, or ...
research
01/19/2022

CyberRadar: A PUF-based Detecting and Mapping Framework for Physical Devices

The core issue of cyberspace detecting and mapping is to accurately iden...
research
10/09/2020

A Graph Neural Network Approach for Scalable and Dynamic IP Similarity in Enterprise Networks

Measuring similarity between IP addresses is an important task in the da...

Please sign up or login with your details

Forgot password? Click here to reset