{"title":"Heartbleed attacks implementation and vulnerability","authors":"Shashank Kyatam, Abdullah Alhayajneh, T. Hayajneh","doi":"10.1109/LISAT.2017.8001980","DOIUrl":null,"url":null,"abstract":"Several vulnerabilities were detected in the open SSL connection versions 1.0.1 and 1.0.1f. Usually, in the previous versions of SSL/TLS, once an SSL connection is established between a client and a server, the connection will stay until the client or server is idle for a certain amount of time, after which the connection will be dropped. The idea of keeping the session connected was proposed in 2012. The initial idea introduced Heartbeat Messages that are indirectly called “keep alive packets”. These “keep alive packets” or “heartbeat packets” are transmitted in between client and server when the SSL session is ideal for a certain amount of time. Regarding “keep alive packets” or “heartbeat packets” mechanisms, these packets are stored in the same memory in which most sensitive information of the client and server is stored. When it is one of the peer's turn to return the heartbeat message, that peer takes the heartbeat packet saved in its random memory location, which is sent by the other peer, and returns it to the other peer to acknowledge the live session. However, the hackers are able to craft a similar Heartbeat Message in a way that makes the peers store it in the same memory location where the sensitive data is stored. Then it returns back the sensitive data along with the crafted heartbeat message sent by the hackers. In this paper, we studied and implemented the heartbleed attack. We also discussed mitigation solutions for this vulnerability.","PeriodicalId":370931,"journal":{"name":"2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 IEEE Long Island Systems, Applications and Technology Conference (LISAT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/LISAT.2017.8001980","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
Several vulnerabilities were detected in the open SSL connection versions 1.0.1 and 1.0.1f. Usually, in the previous versions of SSL/TLS, once an SSL connection is established between a client and a server, the connection will stay until the client or server is idle for a certain amount of time, after which the connection will be dropped. The idea of keeping the session connected was proposed in 2012. The initial idea introduced Heartbeat Messages that are indirectly called “keep alive packets”. These “keep alive packets” or “heartbeat packets” are transmitted in between client and server when the SSL session is ideal for a certain amount of time. Regarding “keep alive packets” or “heartbeat packets” mechanisms, these packets are stored in the same memory in which most sensitive information of the client and server is stored. When it is one of the peer's turn to return the heartbeat message, that peer takes the heartbeat packet saved in its random memory location, which is sent by the other peer, and returns it to the other peer to acknowledge the live session. However, the hackers are able to craft a similar Heartbeat Message in a way that makes the peers store it in the same memory location where the sensitive data is stored. Then it returns back the sensitive data along with the crafted heartbeat message sent by the hackers. In this paper, we studied and implemented the heartbleed attack. We also discussed mitigation solutions for this vulnerability.