Home > Research > Publications & Outputs > From IP to transport and beyond: cross-layer at...

Links

Text available via DOI:

View graph of relations

From IP to transport and beyond: cross-layer attacks against applications

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Published

Standard

From IP to transport and beyond: cross-layer attacks against applications. / Dai, Tianxiang; Jeitner, Philipp; Shulman, Haya et al.
SIGCOMM 2021 - Proceedings of the ACM SIGCOMM 2021 Conference. New York: ACM, 2021. p. 836-849 (SIGCOMM 2021 - Proceedings of the ACM SIGCOMM 2021 Conference).

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

Harvard

Dai, T, Jeitner, P, Shulman, H & Waidner, M 2021, From IP to transport and beyond: cross-layer attacks against applications. in SIGCOMM 2021 - Proceedings of the ACM SIGCOMM 2021 Conference. SIGCOMM 2021 - Proceedings of the ACM SIGCOMM 2021 Conference, ACM, New York, pp. 836-849. https://doi.org/10.1145/3452296.3472933

APA

Dai, T., Jeitner, P., Shulman, H., & Waidner, M. (2021). From IP to transport and beyond: cross-layer attacks against applications. In SIGCOMM 2021 - Proceedings of the ACM SIGCOMM 2021 Conference (pp. 836-849). (SIGCOMM 2021 - Proceedings of the ACM SIGCOMM 2021 Conference). ACM. https://doi.org/10.1145/3452296.3472933

Vancouver

Dai T, Jeitner P, Shulman H, Waidner M. From IP to transport and beyond: cross-layer attacks against applications. In SIGCOMM 2021 - Proceedings of the ACM SIGCOMM 2021 Conference. New York: ACM. 2021. p. 836-849. (SIGCOMM 2021 - Proceedings of the ACM SIGCOMM 2021 Conference). doi: 10.1145/3452296.3472933

Author

Dai, Tianxiang ; Jeitner, Philipp ; Shulman, Haya et al. / From IP to transport and beyond: cross-layer attacks against applications. SIGCOMM 2021 - Proceedings of the ACM SIGCOMM 2021 Conference. New York : ACM, 2021. pp. 836-849 (SIGCOMM 2021 - Proceedings of the ACM SIGCOMM 2021 Conference).

Bibtex

@inproceedings{d4063ad287954e27844fb1978aa3d6c9,
title = "From IP to transport and beyond: cross-layer attacks against applications",
abstract = "We perform the first analysis of methodologies for launching DNS cache poisoning: manipulation at the IP layer, hijack of the inter-domain routing and probing open ports via side channels. We evaluate these methodologies against DNS resolvers in the Internet and compare them with respect to effectiveness, applicability and stealth. Our study shows that DNS cache poisoning is a practical and pervasive threat. We then demonstrate cross-layer attacks that leverage DNS cache poisoning for attacking popular systems, ranging from security mechanisms, such as RPKI, to applications, such as VoIP. In addition to more traditional adversarial goals, most notably impersonation and Denial of Service, we show for the first time that DNS cache poisoning can even enable adversaries to bypass cryptographic defences: we demonstrate how DNS cache poisoning can facilitate BGP prefix hijacking of networks protected with RPKI even when all the other networks apply route origin validation to filter invalid BGP announcements. Our study shows that DNS plays a much more central role in the Internet security than previously assumed. We recommend mitigations for securing the applications and for preventing cache poisoning.",
keywords = "BGP hijacking, DNS cache poisoning, fragmentation, side channels",
author = "Tianxiang Dai and Philipp Jeitner and Haya Shulman and Michael Waidner",
year = "2021",
month = aug,
day = "9",
doi = "10.1145/3452296.3472933",
language = "English",
series = "SIGCOMM 2021 - Proceedings of the ACM SIGCOMM 2021 Conference",
publisher = "ACM",
pages = "836--849",
booktitle = "SIGCOMM 2021 - Proceedings of the ACM SIGCOMM 2021 Conference",

}

RIS

TY - GEN

T1 - From IP to transport and beyond: cross-layer attacks against applications

AU - Dai, Tianxiang

AU - Jeitner, Philipp

AU - Shulman, Haya

AU - Waidner, Michael

PY - 2021/8/9

Y1 - 2021/8/9

N2 - We perform the first analysis of methodologies for launching DNS cache poisoning: manipulation at the IP layer, hijack of the inter-domain routing and probing open ports via side channels. We evaluate these methodologies against DNS resolvers in the Internet and compare them with respect to effectiveness, applicability and stealth. Our study shows that DNS cache poisoning is a practical and pervasive threat. We then demonstrate cross-layer attacks that leverage DNS cache poisoning for attacking popular systems, ranging from security mechanisms, such as RPKI, to applications, such as VoIP. In addition to more traditional adversarial goals, most notably impersonation and Denial of Service, we show for the first time that DNS cache poisoning can even enable adversaries to bypass cryptographic defences: we demonstrate how DNS cache poisoning can facilitate BGP prefix hijacking of networks protected with RPKI even when all the other networks apply route origin validation to filter invalid BGP announcements. Our study shows that DNS plays a much more central role in the Internet security than previously assumed. We recommend mitigations for securing the applications and for preventing cache poisoning.

AB - We perform the first analysis of methodologies for launching DNS cache poisoning: manipulation at the IP layer, hijack of the inter-domain routing and probing open ports via side channels. We evaluate these methodologies against DNS resolvers in the Internet and compare them with respect to effectiveness, applicability and stealth. Our study shows that DNS cache poisoning is a practical and pervasive threat. We then demonstrate cross-layer attacks that leverage DNS cache poisoning for attacking popular systems, ranging from security mechanisms, such as RPKI, to applications, such as VoIP. In addition to more traditional adversarial goals, most notably impersonation and Denial of Service, we show for the first time that DNS cache poisoning can even enable adversaries to bypass cryptographic defences: we demonstrate how DNS cache poisoning can facilitate BGP prefix hijacking of networks protected with RPKI even when all the other networks apply route origin validation to filter invalid BGP announcements. Our study shows that DNS plays a much more central role in the Internet security than previously assumed. We recommend mitigations for securing the applications and for preventing cache poisoning.

KW - BGP hijacking

KW - DNS cache poisoning

KW - fragmentation

KW - side channels

U2 - 10.1145/3452296.3472933

DO - 10.1145/3452296.3472933

M3 - Conference contribution/Paper

T3 - SIGCOMM 2021 - Proceedings of the ACM SIGCOMM 2021 Conference

SP - 836

EP - 849

BT - SIGCOMM 2021 - Proceedings of the ACM SIGCOMM 2021 Conference

PB - ACM

CY - New York

ER -