loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Authors: Anne Borcherding 1 ; 2 ; Philipp Takacs 1 and Jürgen Beyerer 1 ; 2 ; 3

Affiliations: 1 Fraunhofer Institute of Optronics, System Technologies and Image Exploitation IOSB, Karlsruhe, Germany ; 2 KASTEL Security Research Labs, Karlsruhe, Germany ; 3 Vision and Fusion Laboratory (IES), Karlsruhe Institute of Technology (KIT), Karlsruhe, Germany

Keyword(s): Industrial Control Systems, Anti-Patterns, Vulnerability Testing, Ripple20, Amnesia:33, Urgent/11.

Abstract: To ensure functionality and security of network stacks in Industrial Devices, thorough testing is necessary. This includes blackbox network fuzzing, where fields in network packets are filled with unexpected values to test the device’s behavior in edge cases. Due to resource constraints, the tests need to be efficient and such the input values need to be chosen intelligently. Previous solutions use heuristics based on vague knowledge from previous projects to make these decisions. We aim to structure existing knowledge by defining Vulnerability Anti-Patterns for network communication stacks based on an analysis of the recent vulnerability groups Ripple20, Amnesia:33, and Urgent/11. For our evaluation, we implement fuzzing test scripts based on the Vulnerability Anti-Patterns and run them against 8 Industrial Devices from 5 different device classes. We show (I) that similar vulnerabilities occur in implementations of the same protocol as well as in different protocols, (II) that simil ar vulnerabilities also spread over different device classes, and (III) that test scripts based on the Vulnerability Anti-Patterns help to identify these vulnerabilities. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.15.190.144

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Borcherding, A.; Takacs, P. and Beyerer, J. (2022). Cluster Crash: Learning from Recent Vulnerabilities in Communication Stacks. In Proceedings of the 8th International Conference on Information Systems Security and Privacy - ICISSP; ISBN 978-989-758-553-1; ISSN 2184-4356, SciTePress, pages 334-344. DOI: 10.5220/0010806300003120

@conference{icissp22,
author={Anne Borcherding. and Philipp Takacs. and Jürgen Beyerer.},
title={Cluster Crash: Learning from Recent Vulnerabilities in Communication Stacks},
booktitle={Proceedings of the 8th International Conference on Information Systems Security and Privacy - ICISSP},
year={2022},
pages={334-344},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0010806300003120},
isbn={978-989-758-553-1},
issn={2184-4356},
}

TY - CONF

JO - Proceedings of the 8th International Conference on Information Systems Security and Privacy - ICISSP
TI - Cluster Crash: Learning from Recent Vulnerabilities in Communication Stacks
SN - 978-989-758-553-1
IS - 2184-4356
AU - Borcherding, A.
AU - Takacs, P.
AU - Beyerer, J.
PY - 2022
SP - 334
EP - 344
DO - 10.5220/0010806300003120
PB - SciTePress