CRII: SaTC: Analyzing and verifying the security of TCP stacks under multi-entity interactions
CRII:SaTC:多实体交互下TCP协议栈的安全性分析与验证
基本信息
- 批准号:1464410
- 负责人:
- 金额:$ 17.25万
- 依托单位:
- 依托单位国家:美国
- 项目类别:Standard Grant
- 财政年份:2015
- 资助国家:美国
- 起止时间:2015-06-01 至 2018-05-31
- 项目状态:已结题
- 来源:
- 关键词:
项目摘要
The objective of this project is to strengthen the Transmission Control Protocol (TCP), a ubiquitous core Internet protocol, under emerging threat models to make it robust and secure enough to serve the needs of 'smart' technologies in communications, automobiles, medical devices, and other devices that touch our lives every day. It is terrifying to imagine that a smart car could fail to report an accident automatically due to a denial of service attack on its TCP connections, or a smart medical device could fail to report a patient's change in condition. This is not to mention the ever growing cyber attacks that leverage the global and powerful Internet. This project will systematically analyze the root causes of recent security vulnerabilities and generalize them. The results will offer valuable insights on how to avoid the problems. Further, the research is expected to lead to changes to the TCP implementations in major operating systems.Specifically, the research is motivated by the following observations. First, more subtle problems such as side channels have been overlooked in TCP stacks. Second, new threat models have merged, e.g., co-located entities that do not trust each other. Third, the end-to-end assumption of TCP is broken due to the prevalence of network middleboxes, host-based firewalls, and censorship firewalls. The research will leverage model checking to systematically search for vulnerabilities under a variety of threat models and network settings. The models will be constructed from popular operating systems (with recent and representative versions) as well as network middleboxes. They can serve as the basis for testing and verifying future TCP stack implementations.
传输控制协议(TCP)的目的是一种无处不在的核心Internet协议LS,可以使其稳健和确保足以满足“通信,汽车,医疗设备和其他设备”的需求攻击其TCP连接或智能医疗设备可以报告患者的状况变化。进一步的问题,预计TCP在主要操作系统中的实现。互相信任。 )以及网络中间箱。
项目成果
期刊论文数量(0)
专著数量(0)
科研奖励数量(0)
会议论文数量(0)
专利数量(0)
数据更新时间:{{ journalArticles.updateTime }}
{{
item.title }}
{{ item.translation_title }}
- DOI:
{{ item.doi }} - 发表时间:
{{ item.publish_year }} - 期刊:
- 影响因子:{{ item.factor }}
- 作者:
{{ item.authors }} - 通讯作者:
{{ item.author }}
数据更新时间:{{ journalArticles.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ monograph.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ sciAawards.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ conferencePapers.updateTime }}
{{ item.title }}
- 作者:
{{ item.author }}
数据更新时间:{{ patent.updateTime }}
Zhiyun Qian其他文献
Where Is the Weakest Link? A Study on Security Discrepancies Between Android Apps and Their Website Counterparts
最薄弱的环节在哪里?
- DOI:
10.1007/978-3-319-54328-4_8 - 发表时间:
2017 - 期刊:
- 影响因子:0
- 作者:
Arash Alavi;Alan Quach;Hang Zhang;Bryan Marsh;Farhan ul Haq;Zhiyun Qian;Long Lu;Rajiv Gupta - 通讯作者:
Rajiv Gupta
Used by device administration to set the maximum screen off timeout . *
由设备管理用来设置最大屏幕关闭超时。
- DOI:
- 发表时间:
2015 - 期刊:
- 影响因子:0
- 作者:
Yuru Shao;Jason Ott;Qi Alfred Chen;Zhiyun Qian;Z. Morley Mao - 通讯作者:
Z. Morley Mao
Packet Header Obfuscation Using MIMO
使用 MIMO 进行数据包标头混淆
- DOI:
10.1109/tnet.2020.2998398 - 发表时间:
2020 - 期刊:
- 影响因子:0
- 作者:
Yue Cao;A. Atya;Shailendra Singh;Zhiyun Qian;S. Krishnamurthy;T. L. Porta;P. Krishnamurthy;L. Marvel - 通讯作者:
L. Marvel
Who Moves My App Promotion Investment A Systematic Study about App Distribution Fraud
谁动了我的应用推广投资 关于应用分发欺诈的系统研究
- DOI:
- 发表时间:
2021 - 期刊:
- 影响因子:7.3
- 作者:
Shaoyong Du;Minrui Zhao;Jingyu Hua;Hang Zhang;Xiaoyu Chen;Zhiyun Qian;Sheng Zhong - 通讯作者:
Sheng Zhong
Investigation of the 2016 Linux TCP Stack Vulnerability at Scale
对 2016 年 Linux TCP 堆栈漏洞的大规模调查
- DOI:
- 发表时间:
2017 - 期刊:
- 影响因子:0
- 作者:
Alan Quach;Zhongjie Wang;Zhiyun Qian - 通讯作者:
Zhiyun Qian
Zhiyun Qian的其他文献
{{
item.title }}
{{ item.translation_title }}
- DOI:
{{ item.doi }} - 发表时间:
{{ item.publish_year }} - 期刊:
- 影响因子:{{ item.factor }}
- 作者:
{{ item.authors }} - 通讯作者:
{{ item.author }}
{{ truncateString('Zhiyun Qian', 18)}}的其他基金
Collaborative Research: SaTC: CORE: Small: Self-Driving Continuous Fuzzing
协作研究:SaTC:核心:小型:自驱动连续模糊测试
- 批准号:
2247881 - 财政年份:2023
- 资助金额:
$ 17.25万 - 项目类别:
Continuing Grant
Collaborative Research: SaTC: CORE: Small: Improving Decentralized Kernel Patch Ecosystems
协作研究:SaTC:CORE:小型:改善去中心化内核补丁生态系统
- 批准号:
2155213 - 财政年份:2022
- 资助金额:
$ 17.25万 - 项目类别:
Standard Grant
SaTC: CORE: Small: Collaborative: Deep and Efficient Dynamic Analysis of Operating System Kernels
SaTC:核心:小型:协作:操作系统内核的深入有效的动态分析
- 批准号:
1953933 - 财政年份:2020
- 资助金额:
$ 17.25万 - 项目类别:
Standard Grant
SaTC: CORE: Small: Collaborative: The Web Ad Technology Arms Race: Measurement, Analysis, and Countermeasures
SaTC:核心:小型:协作:网络广告技术军备竞赛:测量、分析和对策
- 批准号:
1719147 - 财政年份:2017
- 资助金额:
$ 17.25万 - 项目类别:
Standard Grant
CAREER: Empowering Attacker-Centric Security Analysis of Network Protocols
职业:支持以攻击者为中心的网络协议安全分析
- 批准号:
1652954 - 财政年份:2017
- 资助金额:
$ 17.25万 - 项目类别:
Continuing Grant
NeTS: Small: Collaborative Research: Practical HTTPS Traffic Manipulation At Middleboxes
NetS:小型:协作研究:中间盒的实用 HTTPS 流量操纵
- 批准号:
1619391 - 财政年份:2016
- 资助金额:
$ 17.25万 - 项目类别:
Standard Grant
TWC: Small: Cache-based Side Channel Attacks on Smartphone Graphics Buffers: New Vulnerabilities and Defenses
TWC:小型:针对智能手机图形缓冲区的基于缓存的侧通道攻击:新漏洞和防御
- 批准号:
1619450 - 财政年份:2016
- 资助金额:
$ 17.25万 - 项目类别:
Standard Grant
CSR: Small: Collaborative Research: Taming Mobile Hardware & OS Diversity for Comprehensive Software Analysis
CSR:小型:协作研究:驯服移动硬件
- 批准号:
1617573 - 财政年份:2016
- 资助金额:
$ 17.25万 - 项目类别:
Standard Grant
TWC: Small: Collaborative: Multipath TCP Side Channel Vulnerabilities and Defenses
TWC:小:协作:多路径 TCP 侧信道漏洞和防御
- 批准号:
1528114 - 财政年份:2015
- 资助金额:
$ 17.25万 - 项目类别:
Standard Grant
相似海外基金
Collaborative Research: SaTC: CORE: Medium: Hardware Security Insights: Analyzing Hardware Designs to Understand and Assess Security Weaknesses and Vulnerabilities
协作研究:SaTC:核心:中:硬件安全见解:分析硬件设计以了解和评估安全弱点和漏洞
- 批准号:
2247755 - 财政年份:2023
- 资助金额:
$ 17.25万 - 项目类别:
Continuing Grant
Collaborative Research: SaTC: CORE: Medium: Hardware Security Insights: Analyzing Hardware Designs to Understand and Assess Security Weaknesses and Vulnerabilities
协作研究:SaTC:核心:中:硬件安全见解:分析硬件设计以了解和评估安全弱点和漏洞
- 批准号:
2247756 - 财政年份:2023
- 资助金额:
$ 17.25万 - 项目类别:
Continuing Grant
Collaborative Research: SaTC: CORE: Medium: Hardware Security Insights: Analyzing Hardware Designs to Understand and Assess Security Weaknesses and Vulnerabilities
协作研究:SaTC:核心:中:硬件安全见解:分析硬件设计以了解和评估安全弱点和漏洞
- 批准号:
2247754 - 财政年份:2023
- 资助金额:
$ 17.25万 - 项目类别:
Continuing Grant
Collaborative Research: SaTC: CORE: Small: Privately Collecting and Analyzing V2X Data for Urban Traffic Modeling
合作研究:SaTC:核心:小型:私下收集和分析用于城市交通建模的 V2X 数据
- 批准号:
2302689 - 财政年份:2022
- 资助金额:
$ 17.25万 - 项目类别:
Standard Grant
SaTC: CORE: Small: Understanding, Analyzing, and Improving Password Authentication Practices across the Web
SaTC:核心:小:理解、分析和改进整个 Web 的密码身份验证实践
- 批准号:
2055549 - 财政年份:2021
- 资助金额:
$ 17.25万 - 项目类别:
Standard Grant