Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the Computer

Tutkimustuotos: Artikkeli kirjassa/konferenssijulkaisussaConference contributionScientificvertaisarvioitu

65 Lataukset (Pure)

Abstrakti

Operating systems provide various inter-process communication (IPC) mechanisms. Software applications typically use IPC for communication between front-end and back-end components, which run in different processes on the same computer. This paper studies the security of how the IPC mechanisms are used in PC, Mac and Linux software. We describe attacks where a nonprivileged process impersonates the IPC communication endpoints. The attacks are closely related to impersonation and man-in-the-middle attacks on computer networks but take place inside one computer. The vulnerable IPC methods are ones where a server process binds to a name or address and waits for client communication. Our results show that application developers are often unaware of the risks and secure practices in using IPC. We find attacks against several security-critical applications including password managers and hardware tokens, in which another user's process is able to steal and misuse sensitive data such as the victim's credentials. The vulnerabilities can be exploited in enterprise environments with centralized access control that gives multiple users remote or local login access to the same host. Computers with guest accounts and shared computers at home are similarly vulnerable.
AlkuperäiskieliEnglanti
OtsikkoProceedings of the 27th USENIX Security Symposium, August 15–17, 2018, Baltimore, MD, USA
JulkaisupaikkaBaltimore, MD
KustantajaUSENIX : THE ADVANCED COMPUTING SYSTEMS ASSOCIATION
Sivut1511-1525
Sivumäärä15
ISBN (painettu)978-1-931971-46-1
TilaJulkaistu - 2018
OKM-julkaisutyyppiA4 Artikkeli konferenssijulkaisuussa
TapahtumaUSENIX Security Symposium - Baltimore, Yhdysvallat
Kesto: 15 elokuuta 201817 elokuuta 2018
Konferenssinumero: 27

Conference

ConferenceUSENIX Security Symposium
MaaYhdysvallat
KaupunkiBaltimore
Ajanjakso15/08/201817/08/2018

Sormenjälki

Sukella tutkimusaiheisiin 'Man-in-the-Machine: Exploiting Ill-Secured Communication Inside the Computer'. Ne muodostavat yhdessä ainutlaatuisen sormenjäljen.

Siteeraa tätä