Skip to main content

Showing 1–11 of 11 results for author: Herzberg, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2210.09940  [pdf, other

    cs.CR

    Automatic Detection of Fake Key Attacks in Secure Messaging

    Authors: Tarun Kumar Yadav, Devashish Gosain, Amir Herzberg, Daniel Zappala, Kent Seamons

    Abstract: Popular instant messaging applications such as WhatsApp and Signal provide end-to-end encryption for billions of users. They rely on a centralized, application-specific server to distribute public keys and relay encrypted messages between the users. Therefore, they prevent passive attacks but are vulnerable to some active attacks. A malicious or hacked server can distribute fake keys to users to p… ▽ More

    Submitted 18 October, 2022; originally announced October 2022.

    Comments: An extended version of our paper published at ACM CCS 2022

  2. arXiv:2203.10158  [pdf, other

    cs.CR

    Botnets Breaking Transformers: Localization of Power Botnet Attacks Against the Distribution Grid

    Authors: Lynn Pepin, Lizhi Wang, Jiangwei Wang, Songyang Han, Pranav Pishawikar, Amir Herzberg, Peng Zhang, Fei Miao

    Abstract: Traditional botnet attacks leverage large and distributed numbers of compromised internet-connected devices to target and overwhelm other devices with internet packets. With increasing consumer adoption of high-wattage internet-facing "smart devices", a new "power botnet" attack emerges, where such devices are used to target and overwhelm power grid devices with unusual load demand. We introduce a… ▽ More

    Submitted 18 March, 2022; originally announced March 2022.

    Comments: 18 pages, 10 figures

  3. arXiv:1401.7444  [pdf, other

    cs.CR

    Securing Smartphones: A Micro-TCB Approach

    Authors: Yossi Gilad, Amir Herzberg, Ari Trachtenberg

    Abstract: As mobile phones have evolved into `smartphones', with complex operating systems running third- party software, they have become increasingly vulnerable to malicious applications (malware). We introduce a new design for mitigating malware attacks against smartphone users, based on a small trusted computing base module, denoted uTCB. The uTCB manages sensitive data and sensors, and provides core se… ▽ More

    Submitted 29 January, 2014; originally announced January 2014.

  4. arXiv:1310.1651  [pdf, other

    cs.CY cs.CR

    Ethical Considerations when Employing Fake Identities in OSN for Research

    Authors: Yuval Elovici, Michael Fire, Amir Herzberg, Haya Shulman

    Abstract: Online Social Networks (OSNs) have rapidly become a prominent and widely used service, offering a wealth of personal and sensitive information with significant security and privacy implications. Hence, OSNs are also an important - and popular - subject for research. To perform research based on real-life evidence, however, researchers may need to access OSN data, such as texts and files uploaded b… ▽ More

    Submitted 6 October, 2013; originally announced October 2013.

  5. arXiv:1305.0854  [pdf, other

    cs.CR

    Off-Path Hacking: The Illusion of Challenge-Response Authentication

    Authors: Yossi Gilad, Amir Herzberg, Haya Shulman

    Abstract: Everyone is concerned about the Internet security, yet most traffic is not cryptographically protected. The usual justification is that most attackers are only off-path and cannot intercept traffic; hence, challenge-response mechanisms suffice to ensure authenticity. Usually, the challenges re-use existing `unpredictable' header fields to protect widely-deployed protocols such as TCP and DNS. We a… ▽ More

    Submitted 3 May, 2013; originally announced May 2013.

  6. arXiv:1209.1482  [pdf, other

    cs.CR

    Unilateral Antidotes to DNS Cache Poisoning

    Authors: Amir Herzberg, Haya Shulman

    Abstract: We investigate defenses against DNS cache poisoning focusing on mechanisms that can be readily deployed unilaterally by the resolving organisation, preferably in a single gateway or a proxy. DNS poisoning is (still) a major threat to Internet security; determined spoofing attackers are often able to circumvent currently deployed antidotes such as port randomisation. The adoption of DNSSEC, which w… ▽ More

    Submitted 7 September, 2012; originally announced September 2012.

    Journal ref: SecureComm 2011

  7. arXiv:1208.2357  [pdf, other

    cs.CR

    TCP Injections for Fun and Clogging

    Authors: Yossi Gilad, Amir Herzberg

    Abstract: We present a new type of clogging DoS attacks, with the highest amplification factors achieved by off-path attackers, using only puppets, i.e., sandboxed malware on victim machines. Specifically, we present off-path variants of the Opt-ack, Ack-storm and Coremelt DoS attacks, achieving results comparable to these achieved previously achieved by eavesdrop**/MitM attackers and (unrestricted) malwa… ▽ More

    Submitted 11 August, 2012; originally announced August 2012.

  8. arXiv:1205.5190  [pdf, other

    cs.CR

    Security of Patched DNS

    Authors: Amir Herzberg, Haya Shulman

    Abstract: In spite of the availability of DNSSEC, which protects against cache poisoning even by MitM attackers, many caching DNS resolvers still rely for their security against poisoning on merely validating that DNS responses contain some 'unpredictable' values, copied from the re- quest. These values include the 16 bit identifier field, and other fields, randomised and validated by different 'patches' to… ▽ More

    Submitted 23 May, 2012; originally announced May 2012.

  9. arXiv:1205.4011  [pdf, other

    cs.CR

    Fragmentation Considered Poisonous

    Authors: Amir Herzberg, Haya Shulman

    Abstract: We present practical poisoning and name-server block- ing attacks on standard DNS resolvers, by off-path, spoofing adversaries. Our attacks exploit large DNS responses that cause IP fragmentation; such long re- sponses are increasingly common, mainly due to the use of DNSSEC. In common scenarios, where DNSSEC is partially or incorrectly deployed, our poisoning attacks allow 'com- plete' domain hij… ▽ More

    Submitted 17 May, 2012; originally announced May 2012.

  10. arXiv:1204.6623  [pdf, other

    cs.CR

    Off-Path Attacking the Web

    Authors: Yossi Gilad, Amir Herzberg

    Abstract: We show how an off-path (spoofing-only) attacker can perform cross-site scripting (XSS), cross-site request forgery (CSRF) and site spoofing/defacement attacks, without requiring vulnerabilities in either web-browser or server and circumventing known defenses. Attacker can also launch devastating denial of service (DoS) attacks, even when the connection between the client and the server is secured… ▽ More

    Submitted 30 April, 2012; originally announced April 2012.

  11. arXiv:0910.3511  [pdf, other

    cs.CR

    Stealth-MITM DoS Attacks on Secure Channels

    Authors: Amir Herzberg, Haya Shulman

    Abstract: We define stealth Man-in-the-Middle adversaries, and analyse their ability to launch denial and degradation of service (DoS) attacks on secure channels. We show realistic attacks, disrupting TCP communication over secure VPNs using IPsec. We present: First amplifying DoS attack on IPsec, when deployed without anti-replay window. First amplifying attack on IPsec, when deployed with a `small'… ▽ More

    Submitted 19 October, 2009; originally announced October 2009.

    Comments: 14 figures; 21 pages