Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Stephen Checkoway is active.

Publication


Featured researches published by Stephen Checkoway.


ieee symposium on security and privacy | 2010

Experimental Security Analysis of a Modern Automobile

Karl Koscher; Alexei Czeskis; Franziska Roesner; Shwetak N. Patel; Tadayoshi Kohno; Stephen Checkoway; Damon McCoy; Brian Kantor; Danny Anderson; Hovav Shacham; Stefan Savage

Modern automobiles are no longer mere mechanical devices; they are pervasively monitored and controlled by dozens of digital computers coordinated via internal vehicular networks. While this transformation has driven major advancements in efficiency and safety, it has also introduced a range of new potential risks. In this paper we experimentally evaluate these issues on a modern automobile and demonstrate the fragility of the underlying system structure. We demonstrate that an attacker who is able to infiltrate virtually any Electronic Control Unit (ECU) can leverage this ability to completely circumvent a broad array of safety-critical systems. Over a range of experiments, both in the lab and in road tests, we demonstrate the ability to adversarially control a wide range of automotive functions and completely ignore driver input\dash including disabling the brakes, selectively braking individual wheels on demand, stopping the engine, and so on. We find that it is possible to bypass rudimentary network security protections within the car, such as maliciously bridging between our cars two internal subnets. We also present composite attacks that leverage individual weaknesses, including an attack that embeds malicious code in a cars telematics unit and that will completely erase any evidence of its presence after a crash. Looking forward, we discuss the complex challenges in addressing these vulnerabilities while considering the existing automotive ecosystem.


computer and communications security | 2010

Return-oriented programming without returns

Stephen Checkoway; Lucas Davi; Alexandra Dmitrienko; Ahmad-Reza Sadeghi; Hovav Shacham; Marcel Winandy

We show that on both the x86 and ARM architectures it is possible to mount return-oriented programming attacks without using return instructions. Our attacks instead make use of certain instruction sequences that behave like a return, which occur with sufficient frequency in large libraries on (x86) Linux and (ARM) Android to allow creation of Turing-complete gadget sets. Because they do not make use of return instructions, our new attacks have negative implications for several recently proposed classes of defense against return-oriented programming: those that detect the too-frequent use of returns in the instruction stream; those that detect violations of the last-in, first-out invariant normally maintained for the return-address stack; and those that modify compilers to produce code that avoids the return instruction.


architectural support for programming languages and operating systems | 2013

Iago attacks: why the system call API is a bad untrusted RPC interface

Stephen Checkoway; Hovav Shacham

In recent years, researchers have proposed systems for running trusted code on an untrusted operating system. Protection mechanisms deployed by such systems keep a malicious kernel from directly manipulating a trusted applications state. Under such systems, the application and kernel are, conceptually, peers, and the system call API defines an RPC interface between them. We introduce Iago attacks, attacks that a malicious kernel can mount in this model. We show how a carefully chosen sequence of integer return values to Linux system calls can lead a supposedly protected process to act against its interests, and even to undertake arbitrary computation at the malicious kernels behest. Iago attacks are evidence that protecting applications from malicious kernels is more difficult than previously realized.


computer and communications security | 2016

A Systematic Analysis of the Juniper Dual EC Incident

Stephen Checkoway; Jacob Maskiewicz; Christina Garman; Joshua Fried; Shaanan Cohney; Matthew Green; Nadia Heninger; Ralf Philipp Weinmann; Eric Rescorla; Hovav Shacham

In December 2015, Juniper Networks announced multiple security vulnerabilities stemming from unauthorized code in ScreenOS, the operating system for their NetScreen VPN routers. The more sophisticated of these vulnerabilities was a passive VPN decryption capability, enabled by a change to one of the elliptic curve points used by the Dual EC pseudorandom number generator. In this paper, we describe the results of a full independent analysis of the ScreenOS randomness and VPN key establishment protocol subsystems, which we carried out in response to this incident. While Dual EC is known to be insecure against an attacker who can choose the elliptic curve parameters, Juniper had claimed in 2013 that ScreenOS included countermeasures against this type of attack. We find that, contrary to Junipers public statements, the ScreenOS VPN implementation has been vulnerable since 2008 to passive exploitation by an attacker who selects the Dual EC curve point. This vulnerability arises due to apparent flaws in Junipers countermeasures as well as a cluster of changes that were all introduced concurrently with the inclusion of Dual EC in a single 2008 release. We demonstrate the vulnerability on a real NetScreen device by modifying the firmware to install our own parameters, and we show that it is possible to passively decrypt an individual VPN session in isolation without observing any other network traffic. We investigate the possibility of passively fingerprinting ScreenOS implementations in the wild. This incident is an important example of how guidelines for random number generation, engineering, and validation can fail in practice.


computer and communications security | 2014

On The Security of Mobile Cockpit Information Systems

Devin Lundberg; Brown Farinholt; Edward Sullivan; Ryan Mast; Stephen Checkoway; Stefan Savage; Alex C. Snoeren; Kirill Levchenko

Recent trends in aviation have led many general aviation pilots to adopt the use of iPads (or other tablets) in the cockpit. While initially used to display static charts and documents, uses have expanded to include live data such as weather and traffic information that is used to make flight decisions. Because the tablet and any connected devices are not a part of the onboard systems, they are not currently subject to the software reliability standards applied to avionics. In this paper, we create a risk model for electronic threats against mobile cockpit information systems and evaluate three such systems popular with general aviation pilots today: The Appareo Stratus 2 receiver with the ForeFlight app, the Garmin GDL~39 receiver with the Garmin Pilot app, and the SageTech Clarity CL01 with the WingX Pro7 app. We found all three to be vulnerable, allowing an attacker to manipulate information presented to the pilot, which in some scenarios would lead to catastrophic outcomes. Finally, we provide recommendations for securing such systems.


usenix security symposium | 2011

Comprehensive experimental analyses of automotive attack surfaces

Stephen Checkoway; Damon McCoy; Brian Kantor; Danny Anderson; Hovav Shacham; Stefan Savage; Karl Koscher; Alexei Czeskis; Franziska Roesner; Tadayoshi Kohno


usenix security symposium | 2014

Enforcing forward-edge control-flow integrity in GCC & LLVM

Caroline Tice; Tom Roeder; Peter Collingbourne; Stephen Checkoway; Úlfar Erlingsson; Luis Lozano; Geoff Pike


conference on electronic voting technology workshop on trustworthy elections | 2009

Can DREs provide long-lasting security? the case of return-oriented programming and the AVC advantage

Stephen Checkoway; Ariel J. Feldman; Brian Kantor; J. Alex Halderman; Edward W. Felten; Hovav Shacham


usenix security symposium | 2014

On the practical exploitability of dual EC in TLS implementations

Stephen Checkoway; Matthew Fredrikson; Ruben Niederhagen; Adam Everspaugh; Matthew Green; Tanja Lange; Thomas Ristenpart; Daniel J. Bernstein; Jake Maskiewicz; Hovav Shacham


usenix security symposium | 2011

The phantom tollbooth: privacy-preserving electronic toll collection in the presence of driver collusion

Sarah Meiklejohn; Keaton Mowery; Stephen Checkoway; Hovav Shacham

Collaboration


Dive into the Stephen Checkoway's collaboration.

Top Co-Authors

Avatar

Hovav Shacham

University of California

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Matthew Green

Johns Hopkins University

View shared research outputs
Top Co-Authors

Avatar

Brian Kantor

University of California

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Keaton Mowery

University of California

View shared research outputs
Top Co-Authors

Avatar

Nadia Heninger

University of Pennsylvania

View shared research outputs
Top Co-Authors

Avatar

Shaanan Cohney

University of Pennsylvania

View shared research outputs
Researchain Logo
Decentralizing Knowledge