Technical Report 1140010

Title: Cross-Modal Vulnerabilities: An Illusive form of Hijacking
Version (s): < 1 >
Authors: Eric Osterweil
Dan Massey
Christos Papadopoulos
Date: 2010-05-17
Paper: Download here
Abstract: Content, connection, and other types of hijacking are a common occurrence in today’s Internet. One can broadly classify various types of hijacks as being locally scoped to an administrative domain, or pushed externally; where one administrative domain (intentionally or unintentionally) hijacks users in other domains. Current work in identifying and reacting to various types of Internet hijacking has focused on the net- work control plane and has not included cross-modal hijacks that involve both the control plane and the data plane of the Internet. In this work we introduce the idea that cross- modal threats exist in the Internet and form a highly illusive, but serious threat. Further, we detail an actual instance of Internet-scale cross-modal hijacking whose behavior depends on both network control data and data plane such as the order in which users request connections. Based on anecdotal evidence gleaned from several websites, it appears that this hijack existed for many months (and possibly years) before its recent detection.
SHA256
fingerprint
285915798b402caa51307dd408c85fce6ef31112e2ca9bcb9f47d5436acd4d19
BibTeX:
@TECHREPORT{verisignlabs-tr-1140010-1,
                author = {Eric Osterweil and Dan Massey and Christos Papadopoulos},
                title = {Cross-Modal Vulnerabilities: An Illusive form of Hijacking},
                booktitle = {Verisign Labs Technical Reports},
                number = {1140010 version 1},
                year = {2010},
}

          

[Home]