论文标题

沉默的声音:开源项目中秘密集成渠道的采矿安全漏洞

The Sound of Silence: Mining Security Vulnerabilities from Secret Integration Channels in Open-Source Projects

论文作者

Ramsauer, Ralf, Bulwahn, Lukas, Lohmann, Daniel, Mauerer, Wolfgang

论文摘要

公共开发过程是开源项目的关键特征。但是,通常在一小群受信任的维护者中私下讨论漏洞的修复,并在没有事先公众参与的情况下进行整合。这应该防止早期披露,并应对禁运和不公开协议(NDA)规则。虽然常规开发活动留下公开可用的痕迹,但修复了绕过标准过程的漏洞。 我们提出了一种基于数据挖掘的方法,以检测由标准过程的这种侵犯引起的代码片段。通过系统地将公共开发文物映射到源代码存储库中,我们可以排除常规过程活动,并推断出源于非公开集成渠道的不规则性。对于Linux内核,这是许多系统中最关键的组成部分,我们将方法应用于Linux 5.4发行之前的七个月。我们发现29个提交解决了12个漏洞。对于这些漏洞,我们的方法提供了2至179天的时间优势,以在公开披露之前设计漏洞,并将修复程序推出。 公开开发过程中已建立的负责披露方法应该限制安全漏洞的过早可见性。但是,我们的方法表明,相反,他们为发现这种前提的这种变化提供了更多的可能性。我们通过讨论含义和部分对策来总结。

Public development processes are a key characteristic of open source projects. However, fixes for vulnerabilities are usually discussed privately among a small group of trusted maintainers, and integrated without prior public involvement. This is supposed to prevent early disclosure, and cope with embargo and non-disclosure agreement (NDA) rules. While regular development activities leave publicly available traces, fixes for vulnerabilities that bypass the standard process do not. We present a data-mining based approach to detect code fragments that arise from such infringements of the standard process. By systematically mapping public development artefacts to source code repositories, we can exclude regular process activities, and infer irregularities that stem from non-public integration channels. For the Linux kernel, the most crucial component of many systems, we apply our method to a period of seven months before the release of Linux 5.4. We find 29 commits that address 12 vulnerabilities. For these vulnerabilities, our approach provides a temporal advantage of 2 to 179 days to design exploits before public disclosure takes place, and fixes are rolled out. Established responsible disclosure approaches in open development processes are supposed to limit premature visibility of security vulnerabilities. However, our approach shows that, instead, they open additional possibilities to uncover such changes that thwart the very premise. We conclude by discussing implications and partial countermeasures.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源