Home > Research > Publications & Outputs > Off-Path Attacks Against PKI

Links

Text available via DOI:

View graph of relations

Off-Path Attacks Against PKI

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

Published

Standard

Off-Path Attacks Against PKI. / Dai, Tianxiang; Shulman, Haya; Waidner, Michael.
CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, 2018. p. 2213-2215.

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

Harvard

Dai, T, Shulman, H & Waidner, M 2018, Off-Path Attacks Against PKI. in CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. ACM, New York, pp. 2213-2215. https://doi.org/10.1145/3243734.3278516

APA

Dai, T., Shulman, H., & Waidner, M. (2018). Off-Path Attacks Against PKI. In CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security (pp. 2213-2215). ACM. https://doi.org/10.1145/3243734.3278516

Vancouver

Dai T, Shulman H, Waidner M. Off-Path Attacks Against PKI. In CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM. 2018. p. 2213-2215 doi: 10.1145/3243734.3278516

Author

Dai, Tianxiang ; Shulman, Haya ; Waidner, Michael. / Off-Path Attacks Against PKI. CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. New York : ACM, 2018. pp. 2213-2215

Bibtex

@inbook{cb7ea89002634e64af4af59169726d4d,
title = "Off-Path Attacks Against PKI",
abstract = "The security of Internet-based applications fundamentally relies on the trustworthiness of Certificate Authorities (CAs). We practically demonstrate for the first time that even a very weak attacker, namely, an off-path attacker, can effectively subvert the trustworthiness of popular commercially used CAs. We demonstrate an attack against one popular CA which uses Domain Validation (DV) for authenticating domain ownership. The attack exploits DNS Cache Poisoning and tricks the CA into issuing fraudulent certificates for domains the attacker does not legitimately own -- namely certificates binding the attacker's public key to a victim domain.",
author = "Tianxiang Dai and Haya Shulman and Michael Waidner",
year = "2018",
month = oct,
day = "15",
doi = "10.1145/3243734.3278516",
language = "English",
pages = "2213--2215",
booktitle = "CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security",
publisher = "ACM",

}

RIS

TY - CHAP

T1 - Off-Path Attacks Against PKI

AU - Dai, Tianxiang

AU - Shulman, Haya

AU - Waidner, Michael

PY - 2018/10/15

Y1 - 2018/10/15

N2 - The security of Internet-based applications fundamentally relies on the trustworthiness of Certificate Authorities (CAs). We practically demonstrate for the first time that even a very weak attacker, namely, an off-path attacker, can effectively subvert the trustworthiness of popular commercially used CAs. We demonstrate an attack against one popular CA which uses Domain Validation (DV) for authenticating domain ownership. The attack exploits DNS Cache Poisoning and tricks the CA into issuing fraudulent certificates for domains the attacker does not legitimately own -- namely certificates binding the attacker's public key to a victim domain.

AB - The security of Internet-based applications fundamentally relies on the trustworthiness of Certificate Authorities (CAs). We practically demonstrate for the first time that even a very weak attacker, namely, an off-path attacker, can effectively subvert the trustworthiness of popular commercially used CAs. We demonstrate an attack against one popular CA which uses Domain Validation (DV) for authenticating domain ownership. The attack exploits DNS Cache Poisoning and tricks the CA into issuing fraudulent certificates for domains the attacker does not legitimately own -- namely certificates binding the attacker's public key to a victim domain.

U2 - 10.1145/3243734.3278516

DO - 10.1145/3243734.3278516

M3 - Chapter

SP - 2213

EP - 2215

BT - CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security

PB - ACM

CY - New York

ER -