Activities per year
Abstract
Programmable network data planes are paving the way for networking innovations, with the ability to perform complex, stateful tasks defined in high-level languages such as P4. The enhanced capabilities of programmable data plane devices has made verification of their runtime behaviour, using
established methods such as probe packets, impossible to scale beyond probabilistic detection. This has created a potential opportunity for an attacker, with access to a compromised device, to subtly alter its forwarding program to mishandle only a small subset of packets, evading probabilistic detection. In practice, such subtle binary instrumentation attacks require extensive
knowledge of the forwarding program, yet it is unclear whether a static analysis of compiled P4 programs to obtain this knowledge can be fast and accurate enough for an on-device attack scenario. In this work, we investigate this possibility by implementing a static analysis of P4 programs compiled to BPF bytecode. This analysis gathers sufficient information for the attacker to identify appropriate (reliably correct) edits to the program. We found that, due to predictable compiler behaviours, our analysis remains accurate even when several program behaviours are abstracted away. Our evaluation of the analysis requirements shows that, from a defensive perspective, there is scope for selectively manipulating those instructions in P4-BPF programs that are critical to attack-focused analysis in order to increase its difficulty, without increasing the number of program instructions.
established methods such as probe packets, impossible to scale beyond probabilistic detection. This has created a potential opportunity for an attacker, with access to a compromised device, to subtly alter its forwarding program to mishandle only a small subset of packets, evading probabilistic detection. In practice, such subtle binary instrumentation attacks require extensive
knowledge of the forwarding program, yet it is unclear whether a static analysis of compiled P4 programs to obtain this knowledge can be fast and accurate enough for an on-device attack scenario. In this work, we investigate this possibility by implementing a static analysis of P4 programs compiled to BPF bytecode. This analysis gathers sufficient information for the attacker to identify appropriate (reliably correct) edits to the program. We found that, due to predictable compiler behaviours, our analysis remains accurate even when several program behaviours are abstracted away. Our evaluation of the analysis requirements shows that, from a defensive perspective, there is scope for selectively manipulating those instructions in P4-BPF programs that are critical to attack-focused analysis in order to increase its difficulty, without increasing the number of program instructions.
Original language | English |
---|---|
Title of host publication | 2022 IEEE 8th International Conference on Network Softwarization (NetSoft): Proceedings |
Place of Publication | Milan, Italy |
Publisher | Institute of Electrical and Electronics Engineers Inc. |
ISBN (Electronic) | 978-1-6654-0694-9 |
ISBN (Print) | 978-1-6654-0695-6 |
DOIs | |
Publication status | Published - 03 Aug 2022 |
Event | IEEE International Conference on Network Softwarization 2022 - Milan, Italy Duration: 27 Jun 2022 → 01 Jul 2022 https://netsoft2022.ieee-netsoft.org/ |
Publication series
Name | International Conference on Network Softwarization (NetSoft): Proceedings |
---|---|
Publisher | IEEE |
ISSN (Print) | 2693-9770 |
ISSN (Electronic) | 2693-9789 |
Conference
Conference | IEEE International Conference on Network Softwarization 2022 |
---|---|
Abbreviated title | NetSoft |
Country/Territory | Italy |
City | Milan |
Period | 27/06/2022 → 01/07/2022 |
Internet address |
Fingerprint
Dive into the research topics of 'Investigating the Vulnerability of Programmable Data Planes to Static Analysis-Guided Attacks'. Together they form a unique fingerprint.Activities
- 1 Invited talk
-
Programmable Network Security: Challenges and Opportunities
Sandra Scott-Hayward (Invited speaker)
02 Dec 2022Activity: Talk or presentation types › Invited talk