首页> 外文会议>IEEE Military Communications Conference >Determining the Utility of Cyber Vulnerability Implantation: The Heartbleed Bug as a Cyber Operation
【24h】

Determining the Utility of Cyber Vulnerability Implantation: The Heartbleed Bug as a Cyber Operation

机译:确定网络漏洞植入的实用程序:作为网络操作的令人流血的错误

获取原文

摘要

Flaws in computer software or hardware that are as yet unknown to the public, known as zero-day vulnerabilities, are an increasingly sought-after resource by actors conducting cyber operations. While the objective pursued is commonly defensive, as in protecting own systems and networks, cyber operations may also involve exploiting identified vulnerabilities for intelligence collection or to produce military effects. The weapon zing and stockpiling of such vulnerabilities by various actors, or even the intentional implantation into cyberspace infrastructure, is a trend that currently resembles an arms race. An open question is how to measure the utility that access to these exploitable vulnerabilities provides for military purposes, and how to contrast and compare this to the possible adverse societal consequences that withholding disclosure of them may result in, such as loss of privacy or impeded freedom of the press. This paper presents a case study focusing on the Heart bleed bug, used as a tool in an offensive cyber operation. We introduce a model to estimate the adoption rate of an implanted flaw in Open SSL, derived by fitting collected real-world data. Our calculations show that reaching a global adoption of at least 50 % would take approximately three years from the time of release, given that the vulnerability remains undiscovered, while surpassing 75 % adoption would take an estimated four years. The paper concludes that while exploiting zero-day vulnerabilities may indeed be of significant military utility, such operations take time. They may also incur non-negligible risks of collateral damage and other societal costs.
机译:尚未公开的计算机软件或硬件缺陷(称为零时差漏洞)已成为进行网络运营的参与者越来越抢手的资源。尽管追求的目标通常是防御性的,例如在保护自己的系统和网络中,但网络运营也可能涉及利用已发现的漏洞进行情报收集或产生军事影响。各种行为者对这类漏洞进行武器整理和储存,甚至有意将其植入网络空间基础设施中,是目前类似于军备竞赛的趋势。一个悬而未决的问题是如何衡量为军事目的而使用这些可利用漏洞提供的效用,以及如何与不公开其可能导致的不良社会后果(例如失去隐私或阻碍自由)进行对比和比较。新闻界。本文提供了一个针对Heart出血漏洞的案例研究,该漏洞被用作进攻性网络行动的工具。我们引入一个模型来估计Open SSL中植入的缺陷的采用率,该模型是通过拟合收集的实际数据得出的。我们的计算表明,鉴于该漏洞尚未发现,要达到全球至少50%的采用率,大约需要三年的时间,而超过75%的采用率,则大约需要四年。本文的结论是,尽管利用零日漏洞可能确实具有重大的军事用途,但此类行动仍需要时间。它们还可能招致附带损害和其他社会成本的不可忽略的风险。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号