{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00223110","sets":["6164:6165:6462:11124"]},"path":["11124"],"owner":"44499","recid":"223110","title":["SSL/TLSを回避して盗聴/改ざんを可能にする中間者攻撃の実装 ~公衆無線LANの脆弱性とその脅威~"],"pubdate":{"attribute_name":"公開日","attribute_value":"2022-10-17"},"_buckets":{"deposit":"00cd55b7-97a1-450c-ad1b-398f0bc2797b"},"_deposit":{"id":"223110","pid":{"type":"depid","value":"223110","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"SSL/TLSを回避して盗聴/改ざんを可能にする中間者攻撃の実装 ~公衆無線LANの脆弱性とその脅威~","author_link":["586994","586996","586995","586999","586997","586998"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"SSL/TLSを回避して盗聴/改ざんを可能にする中間者攻撃の実装 ~公衆無線LANの脆弱性とその脅威~"},{"subitem_title":"Implementation of Man-in-the-Middle Attacks that bypass SSL/TLS and allow eavesdropping/falsification  ~Public Wireless LAN Vulnerabilities and Threats~","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"SSL/TLS,無線LAN,中間者攻撃,Captive Portal,脆弱性","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2022-10-17","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"神戸大学工学部"},{"subitem_text_value":"神戸大学大学院工学研究科"},{"subitem_text_value":"神戸大学大学院工学研究科"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Faculty of Engineering, Kobe University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Engineering, Kobe University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Engineering, Kobe University","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/223110/files/IPSJ-CSS2022055.pdf","label":"IPSJ-CSS2022055.pdf"},"date":[{"dateType":"Available","dateValue":"2024-10-17"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-CSS2022055.pdf","filesize":[{"value":"961.1 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"863a52fc-1829-4d18-9388-e861b2add669","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2022 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"木村, 圭一朗"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"白石, 善明"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"森井, 昌克"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Keiichiro, Kimura","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yoshiaki, Shiraishi","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Masakatu, Morii","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"公衆無線 LAN の利用による不正アクセスの可能性については以前から指摘されている.その対策として,VPN や Web アクセスにおいては E2E で運用される SSL/TLS の利用が推奨されている.本発表では,無線LANにおいて SSL/TLS による E2E の暗号化処理を行っていたとしても,それを回避し,通信を盗聴/改ざんし得る方法を提案し,実装を行う.SSL/TLS を回避する方法として,SSL Strip 攻撃や Fake DNS 攻撃が知られているが,その対策方法は既存のほとんどのブラウザに実装され,事実上,その攻撃は不可能である.本発表では,特に公衆無線 LAN において利用される Captive Portal の仕組みを利用して,SSL/TLS を回避した通信の盗聴/改ざんを行う手法を提案する.Captive Portal とは,端末がネットワークに接続した際にユーザー認証や利用者登録などを行うまで外部との通信を禁止あるいは制限する仕組みである.提案する攻撃はユーザーのデバイスやその OS に依存せず,対象は広範囲に及び,大きな現実的脅威になり得る.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"The possibility of unauthorized access through the use of public wireless LANs has long been pointed out. As a countermeasure, the use of SSL/TLS operated by E2E is recommended for VPN and Web access. In this presentation, we propose and implement a method to bypass SSL/TLS in wireless LANs and eavesdrop/falsify the communication, even if E2E encryption is applied. SSL Strip attack and Fake DNS attack are well-known methods to bypass SSL/TLS, but most existing browsers have implemented these countermeasures, making such attacks virtually impossible. In this presentation, we propose a method of eavesdropping/tampering with communication bypassing SSL/TLS using the Captive Portal mechanism, which is used especially in public wireless LANs. Captive Portal is a mechanism that prohibits or restricts communication with the outside world when a terminal connects to the network until the user authenticates or registers. The proposed attack is independent of the user's device and its OS, has a wide range of targets, and can pose a significant practical threat.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"399","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2022論文集"}],"bibliographicPageStart":"393","bibliographicIssueDates":{"bibliographicIssueDate":"2022-10-17","bibliographicIssueDateType":"Issued"}}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"id":223110,"updated":"2025-01-19T13:30:46.133073+00:00","links":{},"created":"2025-01-19T01:22:59.028908+00:00"}