Vetting SSL usage in applications with SSLINT

B He, V Rastogi, Y Cao, Y Chen… - … IEEE Symposium on …, 2015 - ieeexplore.ieee.org
2015 IEEE Symposium on Security and Privacy, 2015ieeexplore.ieee.org
Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols have become the
security backbone of the Web and Internet today. Many systems including mobile and
desktop applications are protected by SSL/TLS protocols against network attacks. However,
many vulnerabilities caused by incorrect use of SSL/TLS APIs have been uncovered in
recent years. Such vulnerabilities, many of which are caused due to poor API design and
inexperience of application developers, often lead to confidential data leakage or man-in-the …
Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols have become the security backbone of the Web and Internet today. Many systems including mobile and desktop applications are protected by SSL/TLS protocols against network attacks. However, many vulnerabilities caused by incorrect use of SSL/TLS APIs have been uncovered in recent years. Such vulnerabilities, many of which are caused due to poor API design and inexperience of application developers, often lead to confidential data leakage or man-in-the-middle attacks. In this paper, to guarantee code quality and logic correctness of SSL/TLS applications, we design and implement SSLINT, a scalable, automated, static analysis system for detecting incorrect use of SSL/TLS APIs. SSLINT is capable of performing automatic logic verification with high efficiency and good accuracy. To demonstrate it, we apply SSLINT to one of the most popular Linux distributions -- Ubuntu. We find 27 previously unknown SSL/TLS vulnerabilities in Ubuntu applications, most of which are also distributed with other Linux distributions.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果