Skip to main content

Showing 1–15 of 15 results for author: Waidner, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.03133  [pdf, other

    cs.CR

    The Harder You Try, The Harder You Fail: The KeyTrap Denial-of-Service Algorithmic Complexity Attacks on DNSSEC

    Authors: Elias Heftrig, Haya Schulmann, Niklas Vogel, Michael Waidner

    Abstract: Availability is a major concern in the design of DNSSEC. To ensure availability, DNSSEC follows Postel's Law [RFC1123]: "Be liberal in what you accept, and conservative in what you send." Hence, nameservers should send not just one matching key for a record set, but all the relevant cryptographic material, e.g., all the keys for all the ciphers that they support and all the corresponding signature… ▽ More

    Submitted 5 June, 2024; originally announced June 2024.

    Comments: Accepted to ACM CCS 2024

  2. arXiv:2405.00531  [pdf, other

    cs.CR

    Byzantine-Secure Relying Party for Resilient RPKI

    Authors: Jens Friess, Donika Mirdita, Haya Schulmann, Michael Waidner

    Abstract: To protect against prefix hijacks, Resource Public Key Infrastructure (RPKI) has been standardized. To enjoy the security guarantees of RPKI validation, networks need to install a new component, the relying party validator, which fetches and validates RPKI objects and provides them to border routers. However, recent work shows that relying parties experience failures when retrieving RPKI objects a… ▽ More

    Submitted 1 May, 2024; originally announced May 2024.

  3. arXiv:2403.19368  [pdf, other

    cs.NI cs.CR

    Cloudy with a Chance of Cyberattacks: Dangling Resources Abuse on Cloud Platforms

    Authors: Jens Frieß, Tobias Gattermayer, Nethanel Gelernter, Haya Schulmann, Michael Waidner

    Abstract: Recent works showed that it is feasible to hijack resources on cloud platforms. In such hijacks, attackers can take over released resources that belong to legitimate organizations. It was proposed that adversaries could abuse these resources to carry out attacks against customers of the hijacked services, e.g., through malware distribution. However, to date, no research has confirmed the existence… ▽ More

    Submitted 28 March, 2024; originally announced March 2024.

    Comments: 17 pages, 29 figures, to be published in NSDI'24: Proceedings of the 21st USENIX Symposium on Networked Systems Design and Implementation

  4. arXiv:2403.15233  [pdf, other

    cs.CR

    Attacking with Something That Does Not Exist: 'Proof of Non-Existence' Can Exhaust DNS Resolver CPU

    Authors: Olivia Gruza, Elias Heftrig, Oliver Jacobsen, Haya Schulmann, Niklas Vogel, Michael Waidner

    Abstract: NSEC3 is a proof of non-existence in DNSSEC, which provides an authenticated assertion that a queried resource does not exist in the target domain. NSEC3 consists of alphabetically sorted hashed names before and after the queried hostname. To make dictionary attacks harder, the hash function can be applied in multiple iterations, which however also increases the load on the DNS resolver during the… ▽ More

    Submitted 17 June, 2024; v1 submitted 22 March, 2024; originally announced March 2024.

    Comments: 13 pages, 7 figures for the associated zonefile generator implementation, see https://github.com/Goethe-Universitat-cybersecurity/NSEC3-Encloser-Attack submitted to USENIX WOOT '24

  5. arXiv:2312.01872  [pdf, other

    cs.CR

    The CURE To Vulnerabilities in RPKI Validation

    Authors: Donika Mirdita, Haya Schulmann, Niklas Vogel, Michael Waidner

    Abstract: Over recent years, the Resource Public Key Infrastructure (RPKI) has seen increasing adoption, with now 37.8% of the major networks filtering bogus BGP routes. Systems interact with the RPKI over Relying Party (RP) implementations that fetch RPKI objects and feed BGP routers with the validated prefix-ownership data. Consequently, any vulnerabilities or flaws within the RP software can substantiall… ▽ More

    Submitted 4 December, 2023; originally announced December 2023.

    Comments: Accepted for publication in NDSS '24

  6. arXiv:2303.11772  [pdf, other

    cs.NI cs.CR

    Keep Your Friends Close, but Your Routeservers Closer: Insights into RPKI Validation in the Internet

    Authors: Tomas Hlavacek, Haya Shulman, Niklas Vogel, Michael Waidner

    Abstract: IP prefix hijacks allow adversaries to redirect and intercept traffic, posing a threat to the stability and security of the Internet. To prevent prefix hijacks, networks should deploy RPKI and filter bogus BGP announcements with invalid routes. In this work we evaluate the impact of RPKI deployments on the security and resilience of the Internet. We aim to understand which networks filter invali… ▽ More

    Submitted 21 March, 2023; originally announced March 2023.

    Comments: Accepted for USENIX Security '23

  7. arXiv:2208.12003  [pdf, other

    cs.CR cs.NI

    XDRI Attacks - and - How to Enhance Resilience of Residential Routers

    Authors: Philipp Jeitner, Haya Shulman, Lucas Teichmann, Michael Waidner

    Abstract: We explore the security of residential routers and find a range of critical vulnerabilities. Our evaluations show that 10 out of 36 popular routers are vulnerable to injections of fake records via misinterpretation of special characters. We also find that in 15 of the 36 routers the mechanisms, that are meant to prevent cache poisoning attacks, can be circumvented. In our Internet-wide study with… ▽ More

    Submitted 25 August, 2022; originally announced August 2022.

    Comments: 31th USENIX Security Symposium (USENIX Security 22), 2022

  8. Poster: The Unintended Consequences of Algorithm Agility in DNSSEC

    Authors: Elias Heftrig, Haya Shulman, Michael Waidner

    Abstract: Cryptographic algorithm agility is an important property for DNSSEC: it allows easy deployment of new algorithms if the existing ones are no longer secure. In this work we show that the cryptographic agility in DNSSEC, although critical for provisioning DNS with strong cryptography, also introduces a vulnerability. We find that under certain conditions, when new algorithms are listed in signed DNS… ▽ More

    Submitted 14 February, 2023; v1 submitted 21 May, 2022; originally announced May 2022.

    Comments: This work has been accepted for publication at the ACM SIGSAC Conference on Computer and Communications Security (CCS 22)

    Journal ref: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (November 2022) Pages 3363 to 3365

  9. From IP to transport and beyond: cross-layer attacks against applications

    Authors: Tianxiang Dai, Philipp Jeitner, Haya Shulman, Michael Waidner

    Abstract: We perform the first analysis of methodologies for launching DNS cache poisoning: manipulation at the IP layer, hijack of the inter-domain routing and probing open ports via side channels. We evaluate these methodologies against DNS resolvers in the Internet and compare them with respect to effectiveness, applicability and stealth. Our study shows that DNS cache poisoning is a practical and pervas… ▽ More

    Submitted 12 May, 2022; originally announced May 2022.

    Journal ref: SIGCOMM '21: Proceedings of the 2021 ACM SIGCOMM 2021 Conference, August 2021, Pages 836-849

  10. arXiv:2205.06064  [pdf, other

    cs.CR cs.NI

    Stalloris: RPKI Downgrade Attack

    Authors: Tomas Hlavacek, Philipp Jeitner, Donika Mirdita, Haya Shulman, Michael Waidner

    Abstract: We demonstrate the first downgrade attacks against RPKI. The key design property in RPKI that allows our attacks is the tradeoff between connectivity and security: when networks cannot retrieve RPKI information from publication points, they make routing decisions in BGP without validating RPKI. We exploit this tradeoff to develop attacks that prevent the retrieval of the RPKI objects from the publ… ▽ More

    Submitted 12 May, 2022; originally announced May 2022.

    Journal ref: 31th USENIX Security Symposium (USENIX Security 22), 2022

  11. arXiv:2205.05473  [pdf, other

    cs.CR

    The Hijackers Guide To The Galaxy: Off-Path Taking Over Internet Resources

    Authors: Tianxiang Dai, Philipp Jeitner, Haya Shulman, Michael Waidner

    Abstract: Internet resources form the basic fabric of the digital society. They provide the fundamental platform for digital services and assets, e.g., for critical infrastructures, financial services, government. Whoever controls that fabric effectively controls the digital society. In this work we demonstrate that the current practices of Internet resources management, of IP addresses, domains, certific… ▽ More

    Submitted 11 May, 2022; originally announced May 2022.

    Journal ref: 30th USENIX Security Symposium (USENIX Security 21), 2021, pages 3147-3164, ISBN 978-1-939133-24-3

  12. arXiv:2107.06415  [pdf, other

    cs.CR

    The Master and Parasite Attack

    Authors: Lukas Baumann, Elias Heftrig, Haya Shulman, Michael Waidner

    Abstract: We explore a new type of malicious script attacks: the persistent parasite attack. Persistent parasites are stealthy scripts, which persist for a long time in the browser's cache. We show to infect the caches of victims with parasite scripts via TCP injection. Once the cache is infected, we implement methodologies for propagation of the parasites to other popular domains on the victim client as… ▽ More

    Submitted 13 July, 2021; originally announced July 2021.

    Comments: The paper has been accepted for publication at the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2021)

  13. The Impact of DNS Insecurity on Time

    Authors: Philipp Jeitner, Haya Shulman, Michael Waidner

    Abstract: We demonstrate the first practical off-path time shifting attacks against NTP as well as against Man-in-the-Middle (MitM) secure Chronos-enhanced NTP. Our attacks exploit the insecurity of DNS allowing us to redirect the NTP clients to attacker controlled servers. We perform large scale measurements of the attack surface in NTP clients and demonstrate the threats to NTP due to vulnerable DNS.

    Submitted 19 October, 2020; originally announced October 2020.

    Journal ref: 2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)

  14. Secure Consensus Generation with Distributed DoH

    Authors: Philipp Jeitner, Haya Shulman, Michael Waidner

    Abstract: Many applications and protocols depend on the ability to generate a pool of servers to conduct majority-based consensus mechanisms and often this is done by doing plain DNS queries. A recent off-path attack [1] against NTP and security enhanced NTP with Chronos [2] showed that relying on DNS for generating the pool of NTP servers introduces a weak link. In this work, we propose a secure, backward-… ▽ More

    Submitted 19 October, 2020; originally announced October 2020.

    Journal ref: 2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S), Valencia, Spain, 2020, pp. 41-42

  15. Pitfalls of Provably Secure Systems in Internet The Case of Chronos-NTP

    Authors: Philipp Jeitner, Haya Shulman, Michael Waidner

    Abstract: The critical role that Network Time Protocol (NTP) plays in the Internet led to multiple efforts to secure it against time-shifting attacks. A recent proposal for enhancing the security of NTP with Chronos against on-path attackers seems the most promising one and is on a standardisation track of the IETF. In this work we demonstrate off-path attacks against Chronos enhanced NTP clients. The weak… ▽ More

    Submitted 16 October, 2020; originally announced October 2020.

    Journal ref: 2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S), Valencia, Spain, 2020, pp. 49-50