A model-based approach to security flaw detection of network protocol implementations

作者: Yating Hsu , Guoqiang Shu , David Lee

DOI: 10.1109/ICNP.2008.4697030

关键词: Computer scienceCommunications protocolProtocol (object-oriented programming)Fuzz testingUniversal composabilityManual testingImplementationFormal specificationFinite-state machineEmbedded system

摘要: A lot of efforts have been devoted to the analysis network protocol specification for reliability and security properties using formal techniques. However, faults can also be introduced during system implementation; it is indispensable detect implementation flaws, yet due black-box nature unavailability most approaches resort random or manual testing. In this paper we propose a model-based approach flaw detection with high fault coverage, measurability, automation. Our first synthesizes an abstract behavioral model from then uses guide testing process detecting flaws. For synthesis reduce problem trace minimization finite state machine efficient algorithm presented space reduction. method implemented applied real protocols. Guided by synthesized our tool reveals number unknown issues automatically crashing implementations Microsoft MSN instant messaging (MSNIM) protocol. Analytical comparison between prevalent syntax-based schemes provided support experimental results.

参考文章(25)
Zhenkai Liang, Juan Caballero, Dawn Song, David Brumley, James Newsome, Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation usenix security symposium. pp. 15- ,(2007)
David A. Molnar, Michael Y. Levin, Patrice Godefroid, Automated Whitebox Fuzz Testing. network and distributed system security symposium. ,(2008)
Xuxian Jiang, Dongyan Xu, Zhiqiang Lin, Xiangyu Zhang, Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution. network and distributed system security symposium. ,(2008)
Doron Peled, Moshe Y. Vardi, Mihalis Yannakakis, Black Box Checking formal techniques for networked and distributed systems. pp. 225- 240 ,(1999) , 10.1007/978-0-387-35578-8_13
Guoqiang Shu, Yating Hsu, David Lee, Detecting Communication Protocol Security Flaws by Formal Fuzz Testing and Machine Learning Formal Techniques for Networked and Distributed Systems – FORTE 2008. pp. 299- 304 ,(2008) , 10.1007/978-3-540-68855-6_19
R. Power, CSI/FBI computer crime and security survey Computer Security Journal. ,vol. 17, pp. 20- 51 ,(2001)
Galen Hunt, Doug Brubacher, Detours: binary interception of Win32 functions conference on usenix windows nt symposium. pp. 14- 14 ,(1999)
Weidong Cui, Helen J. Wang, Jayanthkumar Kannan, Discoverer: automatic protocol reverse engineering from network traces usenix security symposium. pp. 14- ,(2007)
Arlindo L. Oliveira, Stephen Edwards, Limits of Exact Algorithms For Inference of Minimum Size Finite State Machines algorithmic learning theory. pp. 59- 66 ,(1996) , 10.1007/3-540-61863-5_34
Rauli Kaksonen, Marko Laakso, Ari Takanen, System Security Assessment through Specification Mutations and Fault Injection international conference on communications. pp. 27- ,(2001) , 10.1007/978-0-387-35413-2_16