Network Reconnaissance and Vulnerability Excavation of Secure DDS Systems
Title | Network Reconnaissance and Vulnerability Excavation of Secure DDS Systems |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | White, Ruffin, Caiazza, Gianluca, Jiang, Chenxu, Ou, Xinyue, Yang, Zhiyue, Cortesi, Agostino, Christensen, Henrik |
Conference Name | 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS PW) |
Date Published | jun |
Keywords | attacker model, authenticated encryption, authorisation, capability lists, compositionality, crypto handshake, cryptography, data bus, data centric access control, Data Distribution Service, default plugin specifications, digital signatures, distributed networked systems, electronic data interchange, formal verification, Industrial IoT, initial ratification, Internet, interoperable data exchange, IoT protocol, leaked context, middleware, Network reconnaissance, open systems, Peer-to-peer computing, permission attestation, Predictive Metrics, Protocols, pubcrawl, realtime peer-to-peer protocol, Resiliency, Scalability, scalable middleware, scalable verification, secure DDS systems, Secure DDS v, security, Security by Default, security model, Service Plugin Interface architecture, vulnerability excavation |
Abstract | Data Distribution Service (DDS) is a realtime peer-to-peer protocol that serves as a scalable middleware between distributed networked systems found in many Industrial IoT domains such as automotive, medical, energy, and defense. Since the initial ratification of the standard, specifications have introduced a Security Model and Service Plugin Interface (SPI) architecture, facilitating authenticated encryption and data centric access control while preserving interoperable data exchange. However, as Secure DDS v1.1, the default plugin specifications presently exchanges digitally signed capability lists of both participants in the clear during the crypto handshake for permission attestation; thus breaching confidentiality of the context of the connection. In this work, we present an attacker model that makes use of network reconnaissance afforded by this leaked context in conjunction with formal verification and model checking to arbitrarily reason about the underlying topology and reachability of information flow, enabling targeted attacks such as selective denial of service, adversarial partitioning of the data bus, or vulnerability excavation of vendor implementations. |
DOI | 10.1109/EuroSPW.2019.00013 |
Citation Key | white_network_2019 |
- Scalability
- middleware
- Network reconnaissance
- open systems
- Peer-to-peer computing
- permission attestation
- Predictive Metrics
- Protocols
- pubcrawl
- realtime peer-to-peer protocol
- Resiliency
- leaked context
- scalable middleware
- scalable verification
- secure DDS systems
- Secure DDS v
- security
- Security by Default
- security model
- Service Plugin Interface architecture
- vulnerability excavation
- default plugin specifications
- authenticated encryption
- authorisation
- capability lists
- Compositionality
- crypto handshake
- Cryptography
- data bus
- data centric access control
- Data Distribution Service
- attacker model
- digital signatures
- distributed networked systems
- electronic data interchange
- formal verification
- Industrial IoT
- initial ratification
- internet
- interoperable data exchange
- IoT protocol