Sökning: id:"swepub:oai:DiVA.org:uu-484748" >
Applying Symbolic E...
Applying Symbolic Execution to Test Implementations of a Network Protocol Against its Specification
-
- Asadian, Hooman (författare)
- Uppsala universitet,Datorteknik,Avdelningen för datorteknik
-
- Fiterau-Brostean, Paul (författare)
- Uppsala universitet,Datorteknik,Avdelningen för datorteknik
-
- Jonsson, Bengt, 1957- (författare)
- Uppsala universitet,Datorteknik,Avdelningen för datorteknik
-
visa fler...
-
- Sagonas, Konstantinos (författare)
- Uppsala universitet,Datalogi
-
visa färre...
-
(creator_code:org_t)
- Institute of Electrical and Electronics Engineers (IEEE), 2022
- 2022
- Engelska.
-
Ingår i: 2022 IEEE 15TH INTERNATIONAL CONFERENCE ON SOFTWARE TESTING, VERIFICATION AND VALIDATION (ICST 2022). - : Institute of Electrical and Electronics Engineers (IEEE). - 9781665466790 - 9781665466806 ; , s. 70-81
- Relaterad länk:
-
https://urn.kb.se/re...
-
visa fler...
-
https://doi.org/10.1...
-
visa färre...
Abstract
Ämnesord
Stäng
- Implementations of network protocols must conform to their specifications in order to avoid security vulnerabilities and interoperability issues. We describe our experiences using symbolic execution to thoroughly test several implementations of a network security protocol against its specification. We employ a methodology in which we first extract requirements from the protocol's RFC and turn them into formulas. These formulas are then utilized by symbolically executing the protocol implementation to explore code paths that can be traversed on packet sequences that violate a requirement. When this exploration exposes a bug, corresponding input values are produced and turned into test cases that can validate the bug in the original implementation. Since we let symbolic execution be guided by requirements, it can naturally produce a wide variety of requirement-violating input sequences, which is difficult to achieve with existing techniques for protocol testing. We applied this methodology to test four different implementations of MILS against the protocol's RFC. We were able to quickly expose a known CVE in an older version of OpenSSL, and to discover numerous previously unknown vulnerabilities and nonconformance issues in DTI.S implementations, which have by now been confirmed and fixed by their implementors.
Ämnesord
- NATURVETENSKAP -- Data- och informationsvetenskap -- Programvaruteknik (hsv//swe)
- NATURAL SCIENCES -- Computer and Information Sciences -- Software Engineering (hsv//eng)
Nyckelord
- symbolic execution
- network security testing
Publikations- och innehållstyp
- ref (ämneskategori)
- kon (ämneskategori)
Hitta via bibliotek
Till lärosätets databas