Detecting Hidden Storage Side Channel Vulnerabilities in Networked Applications - Inria - Institut national de recherche en sciences et technologies du numérique Accéder directement au contenu
Communication Dans Un Congrès Année : 2011

Detecting Hidden Storage Side Channel Vulnerabilities in Networked Applications

Résumé

Side channels are communication channels that were not intended for communication and that accidentally leak information. A storage side channel leaks information through the content of the channel and not its timing behavior. Storage side channels are a large problem in networked applications since the output at the level of the protocol encoding (e.g., HTTP and HTML) often depends on data and control flow. We call such channels hidden because the output differences blend with the noise of the channel. Within a formal system model, we give a necessary and sufficient condition for such storage side channels to exist. Based on this condition, we develop a method to detect this kind of side channels. The method is based on systematic comparisons of network responses of web applications. We show that this method is useful in practice by exhibiting hidden storage side channels in three well-known web applications: Typo3, Postfix Admin, and Zenith Image Gallery
Fichier principal
Vignette du fichier
978-3-642-21424-0_4_Chapter.pdf (523.03 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-01567587 , version 1 (24-07-2017)

Licence

Paternité

Identifiants

Citer

Felix C. Freiling, Sebastian Schinzel. Detecting Hidden Storage Side Channel Vulnerabilities in Networked Applications. 26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.41-55, ⟨10.1007/978-3-642-21424-0_4⟩. ⟨hal-01567587⟩
79 Consultations
82 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More