ThinkstScapes Research Roundup - Q3 - 2024
Description
Themes covered in this episode
Edge cases at scale still matter
Works from this theme exploit rarely-occurring issues, but with an internet-wide aperture to end up with impressive results. Look for: mechanising bit-squatting; static code analysis for vulnerabilities across all browser extensions, or across web ecosystems; and how Let’s Encrypt worries about revoking and reissuing 400M certificates in a week.
Going above and beyond
Talks and papers often use state-of-the-art tooling to measure/detect an interesting phenomenon. This theme highlights four works that could have followed that path, but also built robust tooling/research data to help others push the state-of-the-art forward. Look for: large scale collection and remediation of dangling domains and static secret leaks, preventing memory-corruption vulnerabilities across the Android ecosystem, remote timing attack frameworks, and SSH testing at scale.
What goes on behind the curtain can be dangerous
Modern IT systems are composed of many layers. Usually the details at lower levels can be abstracted and safely put out of mind. This theme highlights work that shows that what happens in these oft-ignored places can have significant impacts. See: AWS-internal resources built on your behalf, BGP security weaknesses, stealthy hardware backdoors in access control systems spanning over 15 years, Wi-Fi management plane vulnerabilities, VPN-OS interactions, and a legacy file-system hack in Windows.
Nifty sundries
As always, we wanted to showcase work that didn’t fit into the major themes of this issue. We cover: bypassing voice authentication with only a picture of the victim’s face, racking up bills on locked credit cards, email parsing confusion, scanning IPv6, and a timing attack on remote web clients.
Edge cases at scale still matter
Flipping Bits: Your Credentials Are Certainly Mine
Joohoi and STÖK
Universal Code Execution by Chaining Messages in Browser Extensions
Eugene Lim
CVE Hunting Made Easy
Eddie Zhang
How To Revoke And Replace 400 Million Certificates Without Breaking The Internet
Aaron Gable
Going above and beyond
Secrets and Shadows: Leveraging Big Data for Vulnerability Discovery at Scale
Bill Demirkapi
[Blog]
Eliminating Memory Safety Vulnerabilities at the Source
Jeff Vander Stoep and Alex Rebert
[Blog]
Listen to the Whispers: Web Timing Attacks that Actually Work
James Kettle
Secure Shells in Shambles
HD Moore and Rob King
What goes on behind the curtain can be dangerous
Breaching AWS Accounts Through Shadow Resources
Yakir Kadkoda, Michael Katchinskiy, and Ofek Itach
Crashing the Party: Vulnerabilities in RPKI Validation
Niklas Vogel, Donika Mirdita, Haya Schulmann, and Michael Waidner
MIFARE Classic: exposing the static encrypted nonce variant... and a few hardware backdoors
Philippe Teuwen
Fallen Tower of Babel: Rooting Wireless Mesh Networks by Abusing Heterogeneous Control Protocols
Xin'an Zhou, Zhiyun Qian, Juefei Pu, Qing Deng, Srikanth Krishnamurthy, and Keyu Man
Attacking Connection Tracking Frameworks as used by Virtual Private Networks
Benjamin Mixon-Baca, Jeffrey Knockel, Diwen Xue, Deepak Kapur, Roya Ensafi, and Jed Crandall
[Paper]
MagicDot: A Hacker's Magic Show of Disappearing Dots and Spaces
Or Yair
[Slides] [Blog] [Video] [Code]
Nifty sundries
Can I Hear Your Face? Pervasive Attack on Voice Authentication Systems with a Single Face Image
Nan Jiang, Bangjie Sun, Terence Sim, and Jun Han
In Wallet We Trust: Bypassing the Digital Wallets Payment Security for Free Shopping
Raja Hasnain Anwar, Syed Rafiul Hussain, and Muhammad Taqi Raza
Splitting the Email Atom: Exploiting Parsers to Bypass Access Controls
Gareth Heyes
6Sense: Internet-Wide IPv6 Scanning and its Security Applications
Grant Williams, Mert Erdemir, Amanda Hsu, Shraddha Bhat, Abhishek Bhaskar, Frank Li, and Paul Pearce
SnailLoad: Anyone on the Internet Can Learn What You're Doing
Daniel Gruss and Stefan Gast
Conclusions
While we started off 2024 with a modest amount of high-quality works, this has scaled up significantly. As conference publications increase, we do see a slight decline in the number of blogs; there does appear to be some inverse correlation between the two tallies.
We highlighted three themes for this quarter:
- Rare events that happen at internet-scale have big impacts.
- Going above and beyond in tooling development.
- Cross-layer gotchas.
We’re looking forward to seeing how the year closes out with our year in review and the final quarter of 2024.