柠檬导航

News

Juha-Matti Tilli could not sleep; instead, he had an idea that took him to the vulnerabilities of Linux

Juha-Matti Tilli decided to investigate whether a problem related to the topic of his post-graduate studies could be solved better. At the same time, he realised that earlier solutions may have been vulnerable and created a gap in information security.
Aalto University / smartphone and a computer / Photo: Unto Rautio

While working on his post-graduate studies concerning network data packets, Juha-Matti Tilli became interested in a rare way of breaking large quantities of data into IP fragments, that is, pieces to be transmitted over the network. He set out to identify how existing open source operating systems, such as Linux, compiled transmitted fragments into data packets, and was unhappy about what he saw.

Almost all systems seemed to assemble the fragments via a linked list. It is a data structure which the computer has to, in the worst case, go through step by step in order to find the desired information. However, computers can only perform a limited number of operations per second. As a result, the processing of data packets may require so many operations that even a small amount of suitable packets created by a possible attacker can make your computer use all available time to go through the list, and have no time to process useful traffic.

鈥楢 traditional denial-of-service attack requires approximately 100 computers per target. Since few can afford such a number of computers for the purposes of an attack, the attacker contaminates 100 computers belonging to ordinary users. IP packets created for the purpose of an attack, however, only require approximately three computers per attack, which makes the attack 30 times more powerful than previously known methods鈥, he describes.

鈥業t felt meaningful to come across such a vulnerability, but at the same time, I wondered how it had ever managed to materialise.鈥

鈥極ne night last summer, when I tried to fall asleep, I got a radical idea: what if the linked list used in combining packets would be replaced by a balanced search tree? It should be considerably faster than a linked list, which may well have worked as a security risk exposing computers to denial-of-service attacks because of its slowness.鈥

It felt meaningful to come across such a vulnerability, but at the same time, I wondered how it had ever managed to materialise.

Juha-Matti Tilli

Tilli鈥檚 idea of a balanced search tree for reassembling broken data means that the fragments are divided into two groups, which are further divided into groups of two, until the groups only contain only one record at most. For example, in the case of a group of 64 records, rather than going through each individual record, six 鈥榯o the left or to the right鈥 decisions must be made instead. Instead of 64 operations, the computer thus runs only six operations and completes the task more than ten times faster than by using a linked list. Because of the achieved speed, a denial-of-service attack targeted at a computer would require such a huge number of data packets, it would be difficult to implement.

Tilli began to test the speed of Linux and found out that his idea of a balanced search tree was considerably faster than the existing linked list, just as he had expected. While running the tests, Tilli also noticed another vulnerability associated with the most common way to break information, TCP segmentation. He conveyed the information about the detected threats to, for instance, Finnish Communications Regulatory Authority and Linus Torvalds. It was later revealed that some of the vulnerabilities also concerned the Microsoft Windows operating system. Vulnerabilities in both Windows and Linux have now been repaired.

Text: Linda Koskinen
Picture: Unto Rautio

  • Updated:
  • Published:
Share
URL copied!

Read more news

Close-up of a complex scientific instrument with golden components and various wires, in a laboratory setting.
Press releases Published:

Time crystals could power future quantum computers

A time crystal, a long-life quantum system approaching perpetual motion, has been hooked up to its environment for the first time, unlocking an intriguing way to increase quantum computational and sensing power.
A person in black touches a large stone sculpture outside a brick building under a blue sky.
Campus, Research & Art, University Published:

Glitch artwork challenges to see art in a different light

Laura K枚n枚nen's sculpture was unveiled on 14 October at the Otaniemi campus.
Book cover of 'Nanoparticles Integrated Functional Textiles' edited by Md. Reazuddin Repon, Daiva Miku膷ioniene, and Aminoddin Haji.
Research & Art Published:

Nanoparticles in Functional Textiles

Dr. Md. Reazuddin Repon, Postdoctoral Researcher at the Textile Chemistry Group, Department of Bioproducts and Biosystems, Aalto University, has contributed as an editor to a newly published academic volume titled 鈥淣anoparticles Integrated Functional Textiles鈥.
Person standing outdoors in autumn, wearing a grey hoodie and green jacket. Trees in the background with orange leaves.
Appointments Published:

Introducing Qi Chen: Trustworthy AI requires algorithms that can handle unexpected situations

AI developers must focus on safer and fairer AI methods, as the trust and equality of societies are at stake, says new ELLIS Institute Finland principal investigator Qi Chen