Amit Klein's security corner - USENIX http://securitygalore.com/site3/taxonomy/term/32 en Usenix 2019 *extended* paper http://securitygalore.com/site3/usenix2019 <div class="field field-name-body field-type-text-with-summary field-label-hidden"><div class="field-items"><div class="field-item even" property="content:encoded"><p><a href="http://arxiv.org/abs/1906.10478" style="font-size: 1.385em; font-weight: bold;" target="_blank">From IP ID to Device ID and KASLR Bypass (Extended Version)</a></p> <p><strong>Authors: Amit Klein, <a href="http://www.pinkas.net/" target="_blank">Benny Pinkas</a></strong></p> <p><strong>NOTE: this is the extended paper version. The original paper was accepted to Usenix Security 2019.</strong></p> <p><strong>Abstract</strong></p> <p>  IP headers include a 16-bit ID field. Our work examines the <span style="font-size: 13.008px;">generation of this field in Windows (versions 8 and higher), Linux and Android, and shows </span><span style="font-size: 13.008px;">that the IP ID field enables remote servers to assign a unique ID to each </span><span style="font-size: 13.008px;">device and thus be able to identify subsequent transmissions sent from that </span><span style="font-size: 13.008px;">device. This identification works across all browsers and over network changes. </span><span style="font-size: 13.008px;">In modern Linux and Android versions, this field leaks a kernel address, thus </span><span style="font-size: 13.008px;">we also break KASLR.</span></p> <p>  Our work includes reverse-engineering of the Windows IP ID generation code, and a cryptanalysis of this code and of the Linux kernel IP ID generation code. It provides practical techniques to partially extract the key used by each of these algorithms, overcoming different implementation issues, and observing that this key can identify individual devices. We deployed a demo (for Windows) showing that key extraction and machine fingerprinting works in the wild, and tested it from networks around the world.</p> <p><strong>Full paper link</strong>: <a data-saferedirecturl="https://www.google.com/url?q=http://arxiv.org/abs/1906.10478&amp;source=gmail&amp;ust=1561595507546000&amp;usg=AFQjCNGYA1gGMeQOncktmfWyKH-qqejJ1Q" href="http://arxiv.org/abs/1906.10478" rel="noreferrer" style="font-size: 13.008px;" target="_blank">http://arxiv.org/abs/1906.1047<wbr>8</wbr></a></p> </div></div></div><div class="field field-name-field-tags field-type-taxonomy-term-reference field-label-above clearfix"><h3 class="field-label">Tags: </h3><ul class="links"><li class="taxonomy-term-reference-0" rel="dc:subject"><a href="/site3/taxonomy/term/32" typeof="skos:Concept" property="rdfs:label skos:prefLabel" datatype="">USENIX</a></li></ul></div> Sun, 26 May 2019 14:06:47 +0000 amit 27 at http://securitygalore.com/site3 http://securitygalore.com/site3/usenix2019#comments