2025

SCAD: Towards a Universal and Automated Network Side-Channel Vulnerability Detection

Keyu Man, Zhongjie Wang, Yu Hao, Shenghan Zheng, Xin’an Zhou, Yue Cao, Zhiyun Qian
2025 IEEE Symposium on Security and Privacy (SP)

BibTeX
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
  @INPROCEEDINGS {,
author = { Man, Keyu and Wang, Zhongjie and Hao, Yu and Zheng, Shenghan and Zhou, Xin'an and Cao, Yue and Qian, Zhiyun },
booktitle = { 2025 IEEE Symposium on Security and Privacy (SP) },
title = {{ SCAD: Towards a Universal and Automated Network Side-Channel Vulnerability Detection }},
year = {2025},
volume = {},
ISSN = {2375-1207},
pages = {68-68},
abstract = { Network side-channel attacks have recently been highlighted due to their severity and elusive nature. For example, SADDNS attacks allow an off-path attacker to launch cache poisoning attacks leveraging network side channels. Due to the subtle nature of network side channels, it is challenging to identify such side channels. To this date, few automated bug discovery techniques are tailored for such vulnerabilities. Unfortunately, none of them is general and automated enough, making their impact and longer-term use limited. In this paper, we describe the first solution that aims to fill this gap. Specifically, we develop SCAD, aiming at identifying violations of the non-interference property, which are commonly understood as the root cause of network side channels. As non-interference property is a hyperproperty, it necessitates reasoning across multiple execution traces. This motivated us to develop our solution based on under-constrained and dynamic symbolic execution. The state-of-the-art solution, SCENT, applies model checking, which requires extra effort in modeling or simplifying certain parts of a network protocol, in order to scale. Unfortunately, such modeling and simplification is time-consuming, error prone, and can overlook important details, leading to missed vulnerabilities. For example, it was reported that 2.5 person-week was required to construct a self-contained using SCENT. In comparison, SCAD requires only a single person-day to perform labeling of secrets and attacker-observables, and decide the analysis scope. By applying SCAD to multiple TCP and UDP implementations, including Linux, FreeBSD, and lwIP, we find 14 network side-channels, 7 of which were previously unknown, with a false positive rate of only 17.6%. The results reveal serious vulnerabilities, including those that can be used to compromise the previously patched Linux and FreeBSD kernels, making them susceptible to SADDNS attacks or off-path TCP exploits. Our analysis concludes that the majority of the side channels cannot be found by existing solutions due to the aforementioned limitations. },
keywords = {network;side channel;symbolic execution;state variable;tcp;attack},
doi = {10.1109/SP61157.2025.00068},
url = {https://doi.ieeecomputersociety.org/10.1109/SP61157.2025.00068},
publisher = {IEEE Computer Society},
address = {Los Alamitos, CA, USA},
month =May}

2024

Fallen Tower of Babel: Rooting Wireless Mesh Networks by Abusing Heterogeneous Control Protocols

Xin’an Zhou, Zhiyun Qian, Juefei Pu, Srikanth V. Krishnamurthy, Keyu Man
Black Hat USA 2024

Untangling the Knot: Breaking Access Control in Home Wireless Mesh Networks

Xin’an Zhou, Juefei Pu, Keyu Man, Zhiyun Qian, Srikanth V. Krishnamurthy
Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security.

BibTeX
1
2
3
4
5
6
  @inproceedings{zhou2024untangling,
title={Untangling the Knot: Breaking Access Control in Home Wireless Mesh Networks},
author={Zhou, Xin'an and Pu, Juefei and Man, Keyu and Qian, Zhiyun and Krishnamurthy, Srikanth V},
booktitle={Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security},
year={2024}
}

2023

Dilemma in IoT Access Control: Revealing Novel Attacks and Design Challenges in Mobile-as-a-Gateway IoT

PDF
Luyi Xing, Xin’an Zhou, Jiale Guan, Zhiyun Qian
Black Hat Asia 2023

(An anonymous workshop paper)

2022

Perils and Mitigation of Security Risks of Cooperation in Mobile-as-a-Gateway IoT

Site
Xin’an Zhou, Jiale Guan, Luyi Xing, Zhiyun Qian
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security.
Pwnie Award Nomination for Most Under-hyped Research

BibTeX
1
2
3
4
5
6
7
  @inproceedings{zhou2022perils,
title={Perils and mitigation of security risks of cooperation in mobile-as-a-gateway iot},
author={Zhou, Xin'an and Guan, Jiale and Xing, Luyi and Qian, Zhiyun},
booktitle={Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security},
pages={3285--3299},
year={2022}
}

2021

DNS Cache Poisoning Attack: Resurrections with Side Channels

Site
Keyu Man, Xin’an Zhou, and Zhiyun Qian
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security.
Key Insight: Using ICMP as a side-channel to perform DNS Cache Poisoning Attacks.

BibTeX
1
2
3
4
5
6
7
@inproceedings{man2021dns,
title={Dns cache poisoning attack: Resurrections with side channels},
author={Man, Keyu and Zhou, Xin'an and Qian, Zhiyun},
booktitle={Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security},
pages={3400--3414},
year={2021}
}