. Military Space News .
CYBER WARS
Researchers demonstrate potential for zero-knowledge proofs in vulnerability disclosure
by Staff Writers
Washington DC (AFNS) Apr 23, 2021

Trail of Bits has so far demonstrated the ability to perform ZKP disclosure for a wide variety of common types of vulnerabilities in MSP430 binaries, including stack and heap overflows, code injection, format string vulnerabilities, and bypassing memory protections, such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR).

Today, the disclosure process for software vulnerabilities is fraught with challenges. Cybersecurity researchers and software security analysts are faced with an ethics versus efficacy dilemma when it comes to reporting or sharing discovered bugs. Revealing a vulnerability publicly may get the attention of the program's developers and motivate a timely response, but it could also result in a lawsuit against the researcher.

Further, public disclosure could enable bad actors to exploit the discovery before a patch or fix can be applied. Sharing the vulnerability directly with the software maker on the other hand is ethically sound, but may not necessarily prompt action. As history has shown, software makers are often reluctant or unwilling to engage with outside security teams and the disclosed vulnerabilities are frequently ignored, or corrective action is dangerously delayed.

DARPA's Securing Information for Encrypted Verification and Evaluation (SIEVE) program is exploring potential solutions to this problem through the use of zero-knowledge proofs (ZKPs). ZKPs are mathematically verifiable problem statements that can be used to reason about software or systems. The proofs can be used publicly without giving away sensitive information. SIEVE is focused on developing computer science theory and software capable of increasing the expressivity of problem statements for which ZKPs are constructed while also making it easier to use the cryptographic method.

"Prior to SIEVE, one primary focus of applying ZKP research had been on maximizing the speed of communicating and verifying proofs - sometimes called 'succinct zero-knowledge'," said Josh Baron, the program manager leading SIEVE. "For applications like cryptocurrency and blockchain transactions, prioritizing communication and verification efficiency is essential. However, for many potential defense applications, including for highly complex proof statements like those that the Department of Defense may wish to employ, achieving total efficiency and optimization across all metrics may be needed."

In the case of vulnerability disclosure, ZKPs could allow a vulnerability researcher (the prover) to convince a software maker (the verifier) that they possess a piece of information - such as a bug or an exploit - without revealing so much information that their potential for a reward is ruined or requiring that they divulge how the information was uncovered. One year into the SIEVE program, two research teams have demonstrated the first-ever capability to mathematically prove the exploitability of vulnerable software without revealing critical details around the vulnerability itself or the exploit.

One research team led by Galois, Inc., has demonstrated a ZKP for a previously known memory-safety vulnerability in the Game Boy Advance (GBA) Raster Image Transmogrifier, known as grit. Memory-safety vulnerabilities are a critical class of vulnerabilities that frequently occur in modern software. In the Galois-led demonstration, a vulnerability researcher was able to interactively convince another party of the existence of the specific vulnerability in around eight minutes.

To achieve this milestone, researchers developed techniques and prototypes that implement a combination of novel program analyses and protocols for proving and evaluating statements in zero knowledge. Specifically, the team was able to develop a way to compactly mathematically represent memory-safety vulnerabilities, and then create a zero-knowledge proof based on that representation.

Although the current prototype can only produce proofs for programs that use a restricted set of language features, the Galois team aims to extend its capabilities to prove vulnerabilities of any C/C++ program that can be compiled using a standard compiler. They are also actively researching prototypes that offer ZKPs of more complex claims, such as a program's overall memory safety.

A second team of researchers from Trail of Bits is working to model vulnerabilities at the systems architectural level, which is a lower level of abstraction than Galois is working on. Their initial work has created a way to represent real-world instruction set architectures as Boolean circuits - or mathematical models of digital logic circuits - compatible with ZKPs so that users can demonstrate their ability to force a public binary into a specific malicious state.

The team's initial work targets the MSP430 microcontroller, a microprocessor commonly used in embedded systems. From there, they discovered a way to mathematically represent a variety of common vulnerabilities so that ZKPs could be developed to prove the existence of those vulnerabilities. The ZKP statement sizes ranged from 86MB to 1.1 GB, and took from 23 seconds to 256 seconds to verify on a desktop PC.

As an example, the team was able to prove that a smart lock using the MSP430 microcontroller could be opened via an undisclosed exploit without having to share details about the exploit or vulnerability.

"Essentially, the researchers took a smart lock, locked it, and then threw away the key. They were then able to exploit the underlying MSP430 to unlock it, and developed a zero-knowledge proof of the exploit to show that it could be done without having to share how it was done," explained Baron.

Trail of Bits has so far demonstrated the ability to perform ZKP disclosure for a wide variety of common types of vulnerabilities in MSP430 binaries, including stack and heap overflows, code injection, format string vulnerabilities, and bypassing memory protections, such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR).

The team is now working to expand the list of supported architectures and runtime environments, with the goal of capturing much of the common x86 architecture. For example, they plan to produce ZKPs of binaries from DARPA's 2016 Cyber Grand Challenge, which run on DECREE - a simple operating system built on x86. In this way, SIEVE is building on over a decade of DARPA research in how to formalize cybersecurity.


Related Links
Defense Advanced Research Projects Agency
Cyberwar - Internet Security News - Systems and Policy Issues


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


CYBER WARS
Chinese hackers behind VPN attack on US defense firms: security experts
Washington (AFP) April 20, 2021
Chinese hackers allegedly penetrated a company's VPN technology to break into computer networks of the US defense industry sector, security consultant Mandiant said Tuesday. Mandiant linked at least two hacking groups, one of them believed to be an official Chinese cyber-spying operation, to malware used to exploit vulnerabilities in VPN security devices made by Pulse Secure, owned by Utah-based Ivanti. The group used the malware to try to hijack user and administrator identities and enter the s ... read more

Comment using your Disqus, Facebook, Google or Twitter login.



Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle

CYBER WARS
Greece to lend Patriot battery to Saudi as Huthi attacks spike

Missile Warning Satellite Delivered to Cape Canaveral

Lockheed Martin awarded $3.7B to modernize key missile defense mission

Lockheed, Northrop to compete for Next Generation Interceptor program

CYBER WARS
Ford carrier completes combat systems trials with missile-firing exercise

Explosion at Israeli rocket factory a controlled test

Pentagon Will Attempt Hypersonic Missile Shootdown Using US Navy's SM-6 Missile

SeaRAM missile launched from littoral combat ship USS Charleston in exercise

CYBER WARS
Mexico says cartels using drones to attack security forces

DLR develops an unmanned stratospheric aircraft

Future drones likely to resemble 300-million-year-old flying machine

Cuban engineers' dreams take flight with home-grown drones

CYBER WARS
Eutelsat invests in OneWeb, future SpaceX rival

Northrop Grumman designs protected Tactical SATCOM Payload Prototype for the Space Force

Japan-Germany international joint experiment on space optical communication

Parsons awarded $250M Seabed-to-Space ISR contract

CYBER WARS
DoD to assess climate change effects at installations worldwide

BAE, Oshkosh to build prototype cold-weather vehicles for U.S. Army

Marines to begin testing, evaluating new physical training uniforms

Marine Corps commandant to testify before Congress on training fatalities

CYBER WARS
World military spending grows despite pandemic

Study: Total 2020 global military expenditures reached nearly $2 trillion

Lockheed Martin And Thales Australia team up to make weapons locally

Guterres and Ban Ki-moon call for ASEAN to act on Myanmar

CYBER WARS
Japan to host first joint military drill with US, France

Russian DM oversees drills in annexed Crimea; NATO 'in full solidarity' with Czechs

Philippine coast guard holds drills in disputed South China Sea

A ripped up deal, virus accusations and spies: Australia-China relations in freefall

CYBER WARS
Scientists use DNA technology to build tough 3D nanomaterials

New "metalens" shifts focus without tilting or moving

Nanowire could provide a stable, easy-to-make superconducting transistor









The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.