Proceedings of the 2014 Conference on Internet Measurement Conference 2014
DOI: 10.1145/2663716.2663755
|View full text |Cite
|
Sign up to set email alerts
|

The Matter of Heartbleed

Abstract: The Heartbleed vulnerability took the Internet by surprise in April 2014. The vulnerability, one of the most consequential since the advent of the commercial Internet, allowed attackers to remotely read protected memory from an estimated 24-55% of popular HTTPS sites. In this work, we perform a comprehensive, measurementbased analysis of the vulnerability's impact, including (1) tracking the vulnerable population, (2) monitoring patching behavior over time, (3) assessing the impact on the HTTPS certificate eco… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

4
270
1
2

Year Published

2015
2015
2023
2023

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 529 publications
(277 citation statements)
references
References 4 publications
4
270
1
2
Order By: Relevance
“…In the presented scenario, we demonstrate how to introduce a vulnerable version of OpenSSL that is used only on some network nodes and enables The Heartbleed bug [25] exploitation. On the other side, the Attacker node is provided a custom python script 1 , which exploits the heartbeat option and shows the chunks of memory that are leaked by OpenSSL.…”
Section: Tls Heartbleedmentioning
confidence: 99%
“…In the presented scenario, we demonstrate how to introduce a vulnerable version of OpenSSL that is used only on some network nodes and enables The Heartbleed bug [25] exploitation. On the other side, the Attacker node is provided a custom python script 1 , which exploits the heartbeat option and shows the chunks of memory that are leaked by OpenSSL.…”
Section: Tls Heartbleedmentioning
confidence: 99%
“…In April 2014, the release of Heartbleed vulnerability created a big concern for the security of the Internet. One of the most significant Internet weaknesses, Heartbleed enables hackers to distantly read memory information from various popular HTTPS sites including many commercial one such as Amazon, EBay [4]. The release of similar vulnerabilities negatively affects general attitude towards Internet.…”
Section: A Software Security and Bugsmentioning
confidence: 99%
“…Exploiting the software vulnerabilities within the hypervisor source code, sophisticated attacks such as Virtualized Environment Neglected Operations Manipulation (VENOM) [1] have been performed which allow an attacker to break out of a guest VM and access the underlying hypervisor. In addition, attacks such as Heartbleed [2] and Shellshock [3] which exploit the vulnerabilities within the operating system can also be used against the virtualized infrastructure to obtain login details of the guest VMs and perform attacks ranging from privilege escalation to Distributed Denial of Service (DDoS).…”
Section: Introductionmentioning
confidence: 99%