File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1109/DSN.2018.00033
- Scopus: eid_2-s2.0-85051086203
- WOS: WOS:000485508200020
- Find via
Supplementary
- Citations:
- Appears in Collections:
Conference Paper: OWL: Understanding and Detecting Concurrency Attacks
Title | OWL: Understanding and Detecting Concurrency Attacks |
---|---|
Authors | |
Keywords | Concurrency Attack Software Testing |
Issue Date | 2018 |
Publisher | IEEE. The Journal's web site is located at https://ieeexplore.ieee.org/xpl/conhome.jsp?punumber=1000192 |
Citation | The 48th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2018), Luxembourg City, Luxembourg, 25-28 June 2018, p. 219-230 How to Cite? |
Abstract | Just like bugs in single-threaded programs can lead to vulnerabilities, bugs in multithreaded programs can also lead to concurrency attacks. We studied 31 real-world concurrency attacks, including privilege escalations, hijacking code executions, and bypassing security checks. We found that compared to concurrency bugs' traditional consequences (e.g., program crashes), concurrency attacks' consequences are often implicit, extremely hard to be observed and diagnosed by program developers. Moreover, in addition to bug-inducing inputs, extra subtle inputs are often needed to trigger the attacks. These subtle features make existing tools ineffective to detect concurrency attacks. To tackle this problem, we present OWL, the first practical tool that models general concurrency attacks' implicit consequences and automatically detects them. We implemented OWL in Linux and successfully detected five new concurrency attacks, including three confirmed and fixed by developers, and two exploited from previously known and well-studied concurrency bugs. OWL has also detected seven known concurrency attacks. Our evaluation shows that OWL eliminates 94.1% of the reports generated by existing concurrency bug detectors as false positive, greatly reducing developers' efforts on diagnosis. All OWL source code, concurrency attack exploit scripts, and results are available on github.com/hku-systems/owl. |
Persistent Identifier | http://hdl.handle.net/10722/260639 |
ISSN | |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Zhao, SX | - |
dc.contributor.author | Gu, R | - |
dc.contributor.author | Qiu, HR | - |
dc.contributor.author | Li, TO | - |
dc.contributor.author | Wang, Y | - |
dc.contributor.author | Cui, H | - |
dc.contributor.author | Yang, JF | - |
dc.date.accessioned | 2018-09-14T08:44:55Z | - |
dc.date.available | 2018-09-14T08:44:55Z | - |
dc.date.issued | 2018 | - |
dc.identifier.citation | The 48th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2018), Luxembourg City, Luxembourg, 25-28 June 2018, p. 219-230 | - |
dc.identifier.issn | 1530-0889 | - |
dc.identifier.uri | http://hdl.handle.net/10722/260639 | - |
dc.description.abstract | Just like bugs in single-threaded programs can lead to vulnerabilities, bugs in multithreaded programs can also lead to concurrency attacks. We studied 31 real-world concurrency attacks, including privilege escalations, hijacking code executions, and bypassing security checks. We found that compared to concurrency bugs' traditional consequences (e.g., program crashes), concurrency attacks' consequences are often implicit, extremely hard to be observed and diagnosed by program developers. Moreover, in addition to bug-inducing inputs, extra subtle inputs are often needed to trigger the attacks. These subtle features make existing tools ineffective to detect concurrency attacks. To tackle this problem, we present OWL, the first practical tool that models general concurrency attacks' implicit consequences and automatically detects them. We implemented OWL in Linux and successfully detected five new concurrency attacks, including three confirmed and fixed by developers, and two exploited from previously known and well-studied concurrency bugs. OWL has also detected seven known concurrency attacks. Our evaluation shows that OWL eliminates 94.1% of the reports generated by existing concurrency bug detectors as false positive, greatly reducing developers' efforts on diagnosis. All OWL source code, concurrency attack exploit scripts, and results are available on github.com/hku-systems/owl. | - |
dc.language | eng | - |
dc.publisher | IEEE. The Journal's web site is located at https://ieeexplore.ieee.org/xpl/conhome.jsp?punumber=1000192 | - |
dc.relation.ispartof | International Conference on Dependable Systems and Networks (DSN) Proceedings | - |
dc.rights | International Conference on Dependable Systems and Networks (DSN) Proceedings. Copyright © IEEE. | - |
dc.rights | ©2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. | - |
dc.subject | Concurrency Attack | - |
dc.subject | Software Testing | - |
dc.title | OWL: Understanding and Detecting Concurrency Attacks | - |
dc.type | Conference_Paper | - |
dc.identifier.email | Wang, Y: amywang@hku.hk | - |
dc.identifier.email | Cui, H: heming@hku.hk | - |
dc.identifier.authority | Cui, H=rp02008 | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1109/DSN.2018.00033 | - |
dc.identifier.scopus | eid_2-s2.0-85051086203 | - |
dc.identifier.hkuros | 291704 | - |
dc.identifier.spage | 219 | - |
dc.identifier.epage | 230 | - |
dc.identifier.isi | WOS:000485508200020 | - |
dc.publisher.place | United States | - |
dc.identifier.issnl | 1530-0889 | - |