The Sound of Silence: Mining Security Vulnerabilities from Secret Integration Channels in Open-Source Projects

Ralf Ramsauer, Lukas Bulwahn, D. Lohmann, W. Mauerer
{"title":"The Sound of Silence: Mining Security Vulnerabilities from Secret Integration Channels in Open-Source Projects","authors":"Ralf Ramsauer, Lukas Bulwahn, D. Lohmann, W. Mauerer","doi":"10.1145/3411495.3421360","DOIUrl":null,"url":null,"abstract":"Public development processes are a key characteristic of open source projects. However, fixes for vulnerabilities are usually discussed privately among a small group of trusted maintainers, and integrated without prior public involvement. This is supposed to prevent early disclosure, and cope with embargo and non-disclosure agreement (NDA) rules. While regular development activities leave publicly available traces, fixes for vulnerabilities that bypass the standard process do not. We present a data-mining based approach to detect code fragments that arise from such infringements of the standard process. By systematically mapping public development artefacts to source code repositories, we can exclude regular process activities, and infer irregularities that stem from non-public integration channels. For the Linux kernel, the most crucial component of many systems, we apply our method to a period of seven months before the release of Linux 5.4. We find 29 commits that address 12 vulnerabilities. For these vulnerabilities, our approach provides a temporal advantage of 2 to 179 days to design exploits before public disclosure takes place, and fixes are rolled out. Established responsible disclosure approaches in open development processes are supposed to limit premature visibility of security vulnerabilities. However, our approach shows that, instead, they open additional possibilities to uncover such changes that thwart the very premise. We conclude by discussing implications and partial countermeasures.","PeriodicalId":125943,"journal":{"name":"Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop","volume":"8 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2020 ACM SIGSAC Conference on Cloud Computing Security Workshop","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3411495.3421360","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 14

Abstract

Public development processes are a key characteristic of open source projects. However, fixes for vulnerabilities are usually discussed privately among a small group of trusted maintainers, and integrated without prior public involvement. This is supposed to prevent early disclosure, and cope with embargo and non-disclosure agreement (NDA) rules. While regular development activities leave publicly available traces, fixes for vulnerabilities that bypass the standard process do not. We present a data-mining based approach to detect code fragments that arise from such infringements of the standard process. By systematically mapping public development artefacts to source code repositories, we can exclude regular process activities, and infer irregularities that stem from non-public integration channels. For the Linux kernel, the most crucial component of many systems, we apply our method to a period of seven months before the release of Linux 5.4. We find 29 commits that address 12 vulnerabilities. For these vulnerabilities, our approach provides a temporal advantage of 2 to 179 days to design exploits before public disclosure takes place, and fixes are rolled out. Established responsible disclosure approaches in open development processes are supposed to limit premature visibility of security vulnerabilities. However, our approach shows that, instead, they open additional possibilities to uncover such changes that thwart the very premise. We conclude by discussing implications and partial countermeasures.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
沉默之声:从开源项目的秘密集成通道中挖掘安全漏洞
公共开发过程是开源项目的一个关键特征。然而,漏洞的修复通常在一小群受信任的维护者之间私下讨论,并且在没有事先公开参与的情况下集成。这是为了防止过早披露,并应对禁运和保密协议(NDA)规则。虽然常规的开发活动会留下公开可用的痕迹,但绕过标准流程的漏洞修复不会。我们提出了一种基于数据挖掘的方法来检测由于违反标准过程而产生的代码片段。通过系统地将公共开发工件映射到源代码存储库,我们可以排除常规的过程活动,并推断源自非公共集成渠道的不规范行为。对于Linux内核(许多系统中最关键的组件),我们将我们的方法应用于Linux 5.4发布前的7个月。我们发现29个提交涉及12个漏洞。对于这些漏洞,我们的方法提供了2到179天的时间优势,以便在公开披露之前设计漏洞,并推出修复程序。在开放开发过程中建立的负责任的披露方法应该限制安全漏洞的过早可见性。然而,我们的方法表明,相反,它们打开了更多的可能性,以揭示这些变化,破坏了这个前提。最后,我们讨论了影响和部分对策。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
MARTINI: Memory Access Traces to Detect Attacks Securing Classifiers Against Both White-Box and Black-Box Attacks using Encrypted-Input Obfuscation GANRED: GAN-based Reverse Engineering of DNNs via Cache Side-Channel Towards Enabling Secure Web-Based Cloud Services using Client-Side Encryption Non-Interactive Cryptographic Access Control for Secure Outsourced Storage
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1