UMD Cyber Experts Discover Lapses in Heartbleed Bug Fix

UMD Cyber Experts Discover Lapses in Heartbleed Bug Fix

Bookmark and Share



A detailed analysis by cybersecurity experts from the University of Maryland found that website administrators nationwide tasked with patching security holes exploited by the Heartbleed bug may not have done enough.

First disclosed in April 2014, Heartbleed presents a serious vulnerability to the popular OpenSSL (Secure Sockets Layer) software, allowing anyone on the Internet to read the memory of systems that are compromised by the malicious bug.

Assistant Research Scientist Dave Levin and Assistant Professor of Electrical and Computer Engineering Tudor Dumitras were part of a team that analyzed the most popular websites in the United States—more than one million sites were examined—to better understand the extent to which systems administrators followed specific protocols to fix the problem.

Dumitras has a joint appointment with the Department of Electrical and Computer Engineering; he and Levin both have appointments in the Maryland Cybersecurity Center, one of 16 centers and labs in the University of Maryland Institute for Advanced Computer Studies.

Their team, which included researchers from Northeastern University and Stanford University, discovered that while approximately 93 percent of the websites analyzed had patched their software correctly within three weeks of Heartbleed being announced, only 13 percent followed up with other security measures needed to make the systems completely secure.

Once Heartbleed was made public, Levin says, website administrators everywhere should have immediately taken three steps to regain better control and security over their systems.

“They needed to patch their OpenSSL software, they needed to revoke their current certificates, and they needed to reissue new ones,” he says.

Patching, revoking and reissuing are elements of the PKI, or Public Key Infrastructure, which allows for browsers and operating systems to verify that they are communicating with an authentic website, rather than an attacker who is masquerading as a website in order to gain sensitive user information.

But without following through with both revocation and reissue, attackers who already had a website’s private key could still pose as that website, even if the administrator had correctly patched their software.

“Many people seem to think that if they reissue a certificate, it fixes the problem, but, actually, the attack remains possible just as it did before. So, you need to both reissue and revoke the certificates,” says Dumitras.

The team’s data analysis also highlighted an interesting trend that points to the role that humans play in these complex security systems, Dumitras says. In a graph displaying how many certifications were revoked over the course of the three weeks, their data shows a significant drop in revocation rates during weekends.

“Basically, that means that security was taking the weekends off,” he says.

Dumitras and Levin hope that the team’s findings—presented this week at the 2014 Internet Measurement Conference in Vancouver, B.C.—will spur conversations regarding the multiple factors that influence overall computer security, and how those factors can work together to better strengthen systems.

“Security isn’t something to be taken for granted,” Levin says. “I see some of these results and I’m shocked and I’m surprised and I’m a little bit scared. But at the same time, I see it as opportunity for improvement.”

To read the paper, go here. For a complete overview of the team’s work, go here.

 

 

—Written by Andrew Snadecki ’14

 

Related Articles:
Qu Wins NIST Grant
Wu Wins 2015 Signal Processing Society Meritorious Service Award
Annual Cyber Symposium Brings Large Crowd, Interesting Discussion
Vehicular Cybersecurity Workshop Announced

November 7, 2014


Prev   Next

Current Headlines

UMD Researchers Develop New Method for Electrogenic Devices to Control Cell Behavior

UMD Welcomes New VP for Research, Unveils New Vision for Strategic Impact

UMCP and UMB Celebrate 10 Years of Collaboration and MPowering the State

University of Maryland Announces Unprecedented Investment from the A. James & Alice B. Clark Foundation

UMD Awarded U.S. Department of Commerce Grant to Launch Immersive Media Innovation Ecosystem

UMD Research Administration Leader Receives Distinguished Service Award

UMD Professor's Startup Overcomes Challenges of Indoor Positioning Systems

UMD Division of Research Announces Summer Tier 1 Awards

News Resources

Return to Newsroom

Search News

Archived News

Events Resources

Events Calendar

Additional Resources

UM Newsdesk

Faculty Experts

Connect

social iconsFacebookTwitterLinkedInResearch News RSS Feed
Office of Technology Commercialization
2130 Mitchell Building
7999 Regents Dr.
University of Maryland
College Park, MD 20742

Phone: 301-405-3947  |  Fax: 301-314-9502
Email: umdtechtransfer@umd.edu

© Copyright 2013 University of Maryland

Did You Know

UMD's Neutral Buoyancy Research Facility, which simulates weightlessness, is one of only two such facilities in the U.S.