Mealy Verifier: An Automated, Exhaustive, and Explainable Methodology for Analyzing State Machines in Protocol Implementations

被引:0
|
作者
Tran Van, Arthur [1 ]
Levillain, Olivier [1 ]
Debar, Herve [1 ]
机构
[1] Inst Polytech Paris, Telecom SudParis, Samovar, Palaiseau, France
来源
19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024 | 2024年
关键词
Security Protocols; Active Automata Learning; Formal Verification; OPC UA; SSH;
D O I
10.1145/3664476.3664506
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many network protocol specifications are long and lack clarity, which paves the way to implementation errors. Such errors have led to vulnerabilities for secure protocols such as SSH and TLS. Active automata learning, a black-box method, is an efficient method to discover discrepancies between a specification and its implementation. It consists in extracting state machines by interacting with a network stack. It can be (and has been) combined with model checking to analyze the obtained state machines. Model checking is designed for exhibiting a single model violation instead of all model violations and thus leads to a limited understanding of implementation errors. As far as we are aware, there is only one specialized exhaustive method available for analyzing the outcomes of active automata learning applied to network protocols,Fiterau-Brostean's method. We propose an alternative method, to improve the discovery of new bugs and vulnerabilities and enhance the exhaustiveness of model verification processes. In this article, we apply our method to two use cases: SSH, where we focus on the analysis of existing state machines and OPC UA, for which we present a full workflow from state machine inference to state machine analysis.
引用
收藏
页数:10
相关论文
共 3 条
  • [1] Leveraging State Information for Automated Attack Discovery in Transport Protocol Implementations
    Jero, Samuel
    Lee, Hyojeong
    Nita-Rotaru, Cristina
    2015 45TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS, 2015, : 1 - 12
  • [2] SMBugFinder: An Automated Framework for Testing Protocol Implementations for State Machine Bugs
    Fiterau-Brostean, Paul
    Jonsson, Bengt
    Sagonas, Konstantinos
    Taquist, Fredrik
    PROCEEDINGS OF THE 33RD ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS, ISSTA 2024, 2024, : 1866 - 1870
  • [3] Automated Attack Synthesis by Extracting Finite State Machines from Protocol Specification Documents
    Pacheco, Maria Leonor
    von Hippel, Max
    Weintraub, Ben
    Goldwasser, Dan
    Nita-Rotaru, Cristina
    43RD IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2022), 2022, : 51 - 68