Network Reconnaissance and Vulnerability Excavation of Secure DDS Systems

08/14/2019
by   Ruffin White, et al.
0

Distribution Service (DDS) is a realtime peer-to-peer protocol that serves as a scalable middleware between distributed networked systems found in many Industrial IoT domains such as automotive, medical, energy, and defense. Since the initial ratification of the standard, specifications have introduced a Security Model and Service Plugin Interface (SPI) architecture, facilitating authenticated encryption and data centric access control while preserving interoperable data exchange. However, as Secure DDS v1.1, the default plugin specifications presently exchanges digitally signed capability lists of both participants in the clear during the crypto handshake for permission attestation; thus breaching confidentiality of the context of the connection. In this work, we present an attacker model that makes use of network reconnaissance afforded by this leaked context in conjunction with formal verification and model checking to arbitrarily reason about the underlying topology and reachability of information flow, enabling targeted attacks such as selective denial of service, adversarial partitioning of the data bus, or vulnerability excavation of vendor implementations.

READ FULL TEXT

page 1

page 6

research
07/05/2023

Towards a Formal Verification of the Lightning Network with TLA+

Payment channel networks are an approach to improve the scalability of b...
research
04/18/2020

Data Model, Collection and Evaluation Framework for Local Energy Systems

Distributed ledgers are a new type of database technology that allows op...
research
05/17/2023

Automatic and Incremental Repair for Speculative Information Leaks

We present CureSpec, the first model-checking based framework for automa...
research
02/06/2023

Leveraging TLA+ Specifications to Improve the Reliability of the ZooKeeper Coordination Service

ZooKeeper is a coordination service, widely used as a backbone of variou...
research
03/06/2020

A P2P Context Lookup Service for Multiple Smart Spaces

Context information has emerged as an important resource to enable auton...
research
06/02/2020

Secure Sum Outperforms Homomorphic Encryption in (Current) Collaborative Deep Learning

Deep learning (DL) approaches are achieving extraordinary results in a w...
research
07/21/2021

The analysis approach of ThreatGet

Nowadays, almost all electronic devices include a communication interfac...

Please sign up or login with your details

Forgot password? Click here to reset