Enhancing Conformance Testing Using Symbolic Execution for Network Protocols

被引:5
|
作者
Song, JaeSeung [1 ]
Kim, Hyoungshick [2 ]
Park, Soojin [3 ]
机构
[1] Sejong Univ, Dept Comp & Informat Secur, Seoul, South Korea
[2] Sungkyunkwan Univ, Dept Comp Sci & Engn, Suwon, South Korea
[3] Sogang Univ, Grad Sch Management Technol, Seoul, South Korea
基金
新加坡国家研究基金会;
关键词
Conformance testing; Kerberos; protocol verification; symbolic execution; Telnet; test packet generation; SYSTEMS; AUTHENTICATION; GENERATION;
D O I
10.1109/TR.2015.2443392
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security protocols are notoriously difficult to get right, and most go through several iterations before their hidden security vulnerabilities, which are hard to detect, are triggered. To help protocol designers and developers efficiently find non-trivial bugs, we introduce SYMCONF, a practical conformance testing tool that generates high-coverage test input packets using a conformance test suite and symbolic execution. Our approach can be viewed as the combination of conformance testing and symbolic execution: 1) it first selects symbolic inputs from an existing conformance test suite; 2) it then symbolically executes a network protocol implementation with the symbolic inputs; and 3) it finally generates high-coverage test input packets using a conformance test suite. We demonstrate the feasibility of this methodology by applying SYMCONF to the generation of a stream of high quality test input packets for multiple implementations of two network protocols, the Kerberos Telnet protocol and Dynamic Host Configuration Protocol (DHCP), and discovering non-trivial security bugs in the protocols.
引用
收藏
页码:1024 / 1037
页数:14
相关论文
共 50 条
  • [1] VERIFICATION OF PROTOCOLS USING SYMBOLIC EXECUTION
    BRAND, D
    JOYNER, WH
    COMPUTER NETWORKS AND ISDN SYSTEMS, 1978, 2 (4-5): : 351 - 360
  • [2] Using passive testing based on symbolic execution and slicing techniques: Application to the validation of communication protocols
    Mouttappa, Pramila
    Maag, Stephane
    Cavalli, Ana
    COMPUTER NETWORKS, 2013, 57 (15) : 2992 - 3008
  • [3] CONFORMANCE TESTING FOR OSI PROTOCOLS
    LINN, RJ
    COMPUTER NETWORKS AND ISDN SYSTEMS, 1990, 18 (03): : 203 - 219
  • [4] Conformance testing of DECT protocols
    Tarnay, K
    Rotter, CV
    EUROMICRO SUMMER SCHOOL ON MOBILE COMPUTING'98, 1998, 183 : 133 - 143
  • [5] Monitor-based Testing of Network Protocol Implementations Using Symbolic Execution
    Asadian, Hooman
    Fiterau-Brostean, Paul
    Jonsson, Bengt
    Sagonas, Konstantinos
    19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024, 2024,
  • [6] Symbolic Execution of Network Software Based on Unit Testing
    Zhou Lin
    Liu Fei
    Gan Shuitao
    Qin Xiaojun
    Han Wenbao
    2014 9TH IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE, AND STORAGE (NAS), 2014, : 128 - 132
  • [7] AUTOMATED REGRESSION TESTING USING SYMBOLIC EXECUTION
    Barisas, Dominykas
    Milasius, Tomas
    Bareisa, Eduardas
    INFORMATION TECHNOLOGIES' 2011, 2011, : 117 - 124
  • [8] Automated Regression Testing using Symbolic Execution
    Barisas, D.
    Milasius, T.
    Bareisa, E.
    ELEKTRONIKA IR ELEKTROTECHNIKA, 2011, (06) : 101 - 105
  • [9] PROGRAM TESTING USING SYMBOLIC EXECUTION.
    Borzov, Yu.V.
    Programming and Computer Software (English Translation of Programmirovanie), 1980, 6 (01): : 39 - 45
  • [10] SYMBOLIC EXECUTION AND TESTING
    COWARD, PD
    INFORMATION AND SOFTWARE TECHNOLOGY, 1991, 33 (01) : 53 - 64