TY - GEN
T1 - The matter of heartbleed
AU - Durumeric, Zakir
AU - Kasten, James
AU - Adrian, David
AU - Halderman, J. Alex
AU - Bailey, Michael
AU - Li, Frank
AU - Weaver, Nicholas
AU - Amann, Johanna
AU - Beekman, Jethro
AU - Payer, Mathias
AU - Paxson, Vern
N1 - Publisher Copyright:
Copyright © 2014 by the Association for Computing Machinery, Inc. (ACM).
PY - 2014/11/5
Y1 - 2014/11/5
N2 - The Heartbleed vulnerability took the Internet by surprise in April 2014. The vulnerability, one of the most consequential since the advent of the commercial Internet, allowed attackers to remotely read protected memory from an estimated 24-55% of popular HTTPS sites. In this work, we perform a comprehensive, measurementbased analysis of the vulnerability's impact, including (1) tracking the vulnerable population, (2) monitoring patching behavior over time, (3) assessing the impact on the HTTPS certificate ecosystem, and (4) exposing real attacks that attempted to exploit the bug. Furthermore, we conduct a large-scale vulnerability notification experiment involving 150,000 hosts and observe a nearly 50% increase in patching by notified hosts. Drawing upon these analyses, we discuss what went well and what went poorly, in an effort to understand how the technical community can respond more effectively to such events in the future.
AB - The Heartbleed vulnerability took the Internet by surprise in April 2014. The vulnerability, one of the most consequential since the advent of the commercial Internet, allowed attackers to remotely read protected memory from an estimated 24-55% of popular HTTPS sites. In this work, we perform a comprehensive, measurementbased analysis of the vulnerability's impact, including (1) tracking the vulnerable population, (2) monitoring patching behavior over time, (3) assessing the impact on the HTTPS certificate ecosystem, and (4) exposing real attacks that attempted to exploit the bug. Furthermore, we conduct a large-scale vulnerability notification experiment involving 150,000 hosts and observe a nearly 50% increase in patching by notified hosts. Drawing upon these analyses, we discuss what went well and what went poorly, in an effort to understand how the technical community can respond more effectively to such events in the future.
UR - http://www.scopus.com/inward/record.url?scp=84910125196&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84910125196&partnerID=8YFLogxK
U2 - 10.1145/2663716.2663755
DO - 10.1145/2663716.2663755
M3 - Conference contribution
AN - SCOPUS:84910125196
T3 - Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC
SP - 475
EP - 488
BT - IMC 2014 - Proceedings of the 2014 ACM
PB - Association for Computing Machinery
T2 - 2014 ACM Internet Measurement Conference, IMC 2014
Y2 - 5 November 2014 through 7 November 2014
ER -