Investigating the Vulnerability of Programmable Data Planes to Static Analysis-Guided Attacks

Conor Black, Sandra Scott-Hayward
{"title":"Investigating the Vulnerability of Programmable Data Planes to Static Analysis-Guided Attacks","authors":"Conor Black, Sandra Scott-Hayward","doi":"10.1109/NetSoft54395.2022.9844121","DOIUrl":null,"url":null,"abstract":"Programmable network data planes are paving the way for networking innovations, with the ability to perform complex, stateful tasks defined in high-level languages such as P4. The enhanced capabilities of programmable data plane devices has made verification of their runtime behaviour, using established methods such as probe packets, impossible to scale beyond probabilistic detection. This has created a potential opportunity for an attacker, with access to a compromised device, to subtly alter its forwarding program to mishandle only a small subset of packets, evading probabilistic detection. In practice, such subtle binary instrumentation attacks require extensive knowledge of the forwarding program, yet it is unclear whether a static analysis of compiled P4 programs to obtain this knowledge can be fast and accurate enough for an on-device attack scenario. In this work, we investigate this possibility by implementing a static analysis of P4 programs compiled to BPF bytecode. This analysis gathers sufficient information for the attacker to identify appropriate (reliably correct) edits to the program. We found that, due to predictable compiler behaviours, our analysis remains accurate even when several program behaviours are abstracted away. Our evaluation of the analysis requirements shows that, from a defensive perspective, there is scope for selectively manipulating those instructions in P4-BPF programs that are critical to attack-focused analysis in order to increase its difficulty, without increasing the number of program instructions.","PeriodicalId":125799,"journal":{"name":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","volume":"2011 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 8th International Conference on Network Softwarization (NetSoft)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NetSoft54395.2022.9844121","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Programmable network data planes are paving the way for networking innovations, with the ability to perform complex, stateful tasks defined in high-level languages such as P4. The enhanced capabilities of programmable data plane devices has made verification of their runtime behaviour, using established methods such as probe packets, impossible to scale beyond probabilistic detection. This has created a potential opportunity for an attacker, with access to a compromised device, to subtly alter its forwarding program to mishandle only a small subset of packets, evading probabilistic detection. In practice, such subtle binary instrumentation attacks require extensive knowledge of the forwarding program, yet it is unclear whether a static analysis of compiled P4 programs to obtain this knowledge can be fast and accurate enough for an on-device attack scenario. In this work, we investigate this possibility by implementing a static analysis of P4 programs compiled to BPF bytecode. This analysis gathers sufficient information for the attacker to identify appropriate (reliably correct) edits to the program. We found that, due to predictable compiler behaviours, our analysis remains accurate even when several program behaviours are abstracted away. Our evaluation of the analysis requirements shows that, from a defensive perspective, there is scope for selectively manipulating those instructions in P4-BPF programs that are critical to attack-focused analysis in order to increase its difficulty, without increasing the number of program instructions.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
静态分析引导攻击下可编程数据平面的脆弱性研究
可编程网络数据平面能够执行用高级语言(如P4)定义的复杂的、有状态的任务,为网络创新铺平了道路。可编程数据平面设备的增强功能使得使用既定方法(如探测数据包)验证其运行时行为不可能扩展到概率检测之外。这为攻击者创造了一个潜在的机会,可以访问受损设备,巧妙地改变其转发程序,使其仅错误处理一小部分数据包,从而逃避概率检测。在实践中,这种微妙的二进制检测攻击需要对转发程序有广泛的了解,但目前尚不清楚的是,对编译后的P4程序进行静态分析,以获得这些知识,对于设备上的攻击场景来说,是否足够快速和准确。在这项工作中,我们通过实现编译成BPF字节码的P4程序的静态分析来研究这种可能性。该分析为攻击者收集了足够的信息,以识别对程序的适当(可靠正确)编辑。我们发现,由于可预测的编译器行为,即使在抽象掉一些程序行为时,我们的分析仍然是准确的。我们对分析需求的评估表明,从防御的角度来看,在不增加程序指令数量的情况下,可以有选择地操纵P4-BPF程序中的那些指令,这些指令对以攻击为重点的分析至关重要。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Flexible Measurement Testbed for Evaluating Time-Sensitive Networking in Industrial Automation Applications Latency-aware Topology Discovery in SDN-based Time-Sensitive Networks NLP4: An Architecture for Intent-Driven Data Plane Programmability CHIMA: a Framework for Network Services Deployment and Performance Assurance Encrypted Network Traffic Classification in SDN using Self-supervised Learning
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1