Heartbleed attacks implementation and vulnerability

Shashank Kyatam, Abdullah Alhayajneh, T. Hayajneh
{"title":"Heartbleed attacks implementation and vulnerability","authors":"Shashank Kyatam, Abdullah Alhayajneh, T. Hayajneh","doi":"10.1109/LISAT.2017.8001980","DOIUrl":null,"url":null,"abstract":"Several vulnerabilities were detected in the open SSL connection versions 1.0.1 and 1.0.1f. Usually, in the previous versions of SSL/TLS, once an SSL connection is established between a client and a server, the connection will stay until the client or server is idle for a certain amount of time, after which the connection will be dropped. The idea of keeping the session connected was proposed in 2012. The initial idea introduced Heartbeat Messages that are indirectly called “keep alive packets”. These “keep alive packets” or “heartbeat packets” are transmitted in between client and server when the SSL session is ideal for a certain amount of time. Regarding “keep alive packets” or “heartbeat packets” mechanisms, these packets are stored in the same memory in which most sensitive information of the client and server is stored. When it is one of the peer's turn to return the heartbeat message, that peer takes the heartbeat packet saved in its random memory location, which is sent by the other peer, and returns it to the other peer to acknowledge the live session. However, the hackers are able to craft a similar Heartbeat Message in a way that makes the peers store it in the same memory location where the sensitive data is stored. Then it returns back the sensitive data along with the crafted heartbeat message sent by the hackers. In this paper, we studied and implemented the heartbleed attack. We also discussed mitigation solutions for this vulnerability.","PeriodicalId":370931,"journal":{"name":"2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/LISAT.2017.8001980","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4

Abstract

Several vulnerabilities were detected in the open SSL connection versions 1.0.1 and 1.0.1f. Usually, in the previous versions of SSL/TLS, once an SSL connection is established between a client and a server, the connection will stay until the client or server is idle for a certain amount of time, after which the connection will be dropped. The idea of keeping the session connected was proposed in 2012. The initial idea introduced Heartbeat Messages that are indirectly called “keep alive packets”. These “keep alive packets” or “heartbeat packets” are transmitted in between client and server when the SSL session is ideal for a certain amount of time. Regarding “keep alive packets” or “heartbeat packets” mechanisms, these packets are stored in the same memory in which most sensitive information of the client and server is stored. When it is one of the peer's turn to return the heartbeat message, that peer takes the heartbeat packet saved in its random memory location, which is sent by the other peer, and returns it to the other peer to acknowledge the live session. However, the hackers are able to craft a similar Heartbeat Message in a way that makes the peers store it in the same memory location where the sensitive data is stored. Then it returns back the sensitive data along with the crafted heartbeat message sent by the hackers. In this paper, we studied and implemented the heartbleed attack. We also discussed mitigation solutions for this vulnerability.
心脏出血攻击实现和漏洞
在开放SSL连接版本1.0.1和1.0.1f中检测到几个漏洞。通常,在以前的SSL/TLS版本中,一旦在客户端和服务器之间建立了SSL连接,该连接将一直保持到客户端或服务器空闲一段时间之后,该连接将被丢弃。保持两会互联互通的想法是在2012年提出的。最初的想法是引入心跳消息,间接地称为“保持存活数据包”。当SSL会话在一定时间内是理想状态时,这些“保持活动数据包”或“心跳数据包”在客户机和服务器之间传输。对于“keep alive数据包”或“heartbeat数据包”机制,这些数据包存储在存储客户端和服务器的大多数敏感信息的同一内存中。当轮到一个对等体返回心跳消息时,该对等体将另一个对等体发送的保存在其随机内存位置的心跳数据包返回给另一个对等体,以确认正在进行的会话。然而,黑客们能够制造出类似的“心跳消息”,让对等体将其存储在存储敏感数据的相同内存位置。然后,它会返回敏感数据以及黑客发送的精心制作的心跳消息。在本文中,我们研究并实现了心脏出血攻击。我们还讨论了针对此漏洞的缓解解决方案。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信