Detecting Hidden Storage Side Channel Vulnerabilities in Networked Applications - Future Challenges in Security and Privacy for Academia and Industry
Conference Papers Year : 2011

Detecting Hidden Storage Side Channel Vulnerabilities in Networked Applications

Abstract

Side channels are communication channels that were not intended for communication and that accidentally leak information. A storage side channel leaks information through the content of the channel and not its timing behavior. Storage side channels are a large problem in networked applications since the output at the level of the protocol encoding (e.g., HTTP and HTML) often depends on data and control flow. We call such channels hidden because the output differences blend with the noise of the channel. Within a formal system model, we give a necessary and sufficient condition for such storage side channels to exist. Based on this condition, we develop a method to detect this kind of side channels. The method is based on systematic comparisons of network responses of web applications. We show that this method is useful in practice by exhibiting hidden storage side channels in three well-known web applications: Typo3, Postfix Admin, and Zenith Image Gallery
Fichier principal
Vignette du fichier
978-3-642-21424-0_4_Chapter.pdf (523.03 Ko) Télécharger le fichier
Origin Files produced by the author(s)
Loading...

Dates and versions

hal-01567587 , version 1 (24-07-2017)

Licence

Identifiers

Cite

Felix C. Freiling, Sebastian Schinzel. Detecting Hidden Storage Side Channel Vulnerabilities in Networked Applications. 26th International Information Security Conference (SEC), Jun 2011, Lucerne, Switzerland. pp.41-55, ⟨10.1007/978-3-642-21424-0_4⟩. ⟨hal-01567587⟩
93 View
100 Download

Altmetric

Share

More