Most people are now aware that @trailofbits conducted a security review of the Bitcoin Cash client on behalf of @BitcoinSVNode. While we cannot release our report in its entirety yet, I wanted to share a few details of what we found…https://twitter.com/JimmyWinMedia/status/1101668023335833601 …
-
Show this thread
-
First, as far as we are aware, this was the first time a professional services firm reviewed the security of a Bitcoin client. We began with a comprehensive review of the bitcoind attack surface and surveyed previous attempts to fuzz it.
2 replies 0 retweets 20 likesShow this thread -
Prior fuzzing efforts appeared ad-hoc, did not share their input sets or report code coverage, and referred to outdated, unworking instructions. We identified surprising gaps in coverage when compared to our attack surface modeling and set about to remedy the situation.pic.twitter.com/YTwvGQ3RLI
2 replies 3 retweets 23 likesShow this thread -
In our first week, we developed libFuzzer and AFL drivers targeted to specific areas of high-priority attack surface and modified build scripts to support a “fuzzer mode.” This vastly enhances fuzzing effectiveness, e.g.: https://github.com/google/boringssl/blob/master/FUZZING.md …
1 reply 1 retweet 19 likesShow this thread -
These fuzzer drivers and build enhancements were integrated directly into the BitcoinSV codebase, improving its SDLC. Fuzz test corpora are saved after each campaign and milestones are re-fuzzed with these continuously refined test cases. (these are not yet public)
1 reply 0 retweets 11 likesShow this thread -
After building fuzzers driven by attack surface modeling and using best practices, we identified a number of security issues over the course of the engagement. This included some of the medium-severity issues that BitcoinSV obtained CVEs to track. https://bitcoinsv.io/2019/03/01/denial-of-service-vulnerabilities-repaired-in-bitcoin-sv-version-0-1-1/ …
1 reply 1 retweet 12 likesShow this thread -
These issues detail ways for messages to waste a victim’s CPU and network resources without triggering any of the denial-of-service mitigations that normally detect and ban misbehaving peers.
1 reply 0 retweets 8 likesShow this thread -
This concluded the 1st week of a 6 week project. I’ll save further details for when the full report comes out. Suffice to say, please get in touch if you want a similarly comprehensive security review, driven by engineering goals and fuzz test development.https://www.trailofbits.com/contact/
2 replies 0 retweets 18 likesShow this thread -
Replying to @dguido
Is fuzz testing the only method you apply / report on, or do you employ other methods?
1 reply 0 retweets 0 likes
We'll use the right method to fit the job. @trailofbits are experts in the fields of program analysis, automated testing, formal methods, and software security generally, and will pull in any applicable research when useful.
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.