DY Fuzzing: Formal Dolev-Yao Models Meet Cryptographic Protocol Fuzz Testing

被引:1
|
作者
Ammann, Max [1 ,2 ]
Hirschi, Lucca [2 ]
Kremer, Steve [2 ]
机构
[1] Trail Bits, New York, NY 10003 USA
[2] Univ Lorraine, LORIA, Inria Nancy Grand Est, Nancy, France
关键词
SECURITY;
D O I
10.1109/SP54263.2024.00096
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Critical and widely used cryptographic protocols have repeatedly been found to contain flaws in their design and their implementation. A prominent class of such vulnerabilities is logical attacks, e.g. attacks that exploit flawed protocol logic. Automated formal verification methods, based on the Dolev-Yao (DY) attacker, formally define and excel at finding such flaws, but operate only on abstract specification models. Fully automated verification of existing protocol implementations is today still out of reach. This leaves open whether such implementations are secure. Unfortunately, this blind spot hides numerous attacks, such as recent logical attacks on widely used TLS implementations introduced by implementation bugs. We answer by proposing a novel and effective technique that we call DY model-guided fuzzing, which precludes logical attacks against protocol implementations. The main idea is to consider as possible test cases the set of abstract DY executions of the DY attacker, and use a novel mutation-based fuzzer to explore this set. The DY fuzzer concretizes each abstract execution to test it on the program under test. This approach enables reasoning at a more structural and security-related level of messages represented as formal terms (e.g. decrypt a message and re-encrypt it with a different key) as opposed to random bit-level modifications that are much less likely to produce relevant logical adversarial behaviors. We implement a full-fledged and modular DY protocol fuzzer. We demonstrate its effectiveness by fuzzing three popular TLS implementations, resulting in the discovery of four novel vulnerabilities.
引用
收藏
页码:1481 / 1499
页数:19
相关论文
共 10 条
  • [1] Cryptographic protocol logic: Satisfaction for (timed) Dolev-Yao cryptography
    Kramer, Simon
    JOURNAL OF LOGIC AND ALGEBRAIC PROGRAMMING, 2008, 77 (1-2): : 60 - 91
  • [2] Flow logic for Dolev-Yao secrecy in cryptographic processes
    Bodei, C
    Degano, P
    Nielson, F
    Nielson, HR
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2002, 18 (06): : 747 - 756
  • [3] Symmetric encryption in a simulatable Dolev-Yao style cryptographic library
    Backes, M
    Pfitzmann, B
    17TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS, 2004, : 204 - 218
  • [4] Limits of the BRSIM/UC soundness of Dolev-Yao models with hashes
    Backes, Michael
    Pfitzmann, Birgit
    Waidner, Michael
    COMPUTER SECURITY - ESORICS 2006, PROCEEDINGS, 2006, 4189 : 404 - 423
  • [5] A structured operational semantic modelling of the Dolev-Yao threat environment and its composition with cryptographic protocols
    Mao, W
    COMPUTER STANDARDS & INTERFACES, 2005, 27 (05) : 479 - 488
  • [6] Formalization in PVS of Balancing Properties Necessary for Proving Security of the Dolev-Yao Cascade Protocol Model
    Rego, Yuri Santos
    Ayala-Rincon, Mauricio
    JOURNAL OF FORMALIZED REASONING, 2013, 6 (01): : 31 - 61
  • [7] A cryptographically sound Dolev-Yao style security proof of the Otway-Rees protocol
    Backes, M
    COMPUTER SECURITY ESORICS 2004, PROCEEDINGS, 2004, 3193 : 89 - 108
  • [8] Security Analysis of a Key Exchange Protocol under Dolev-Yao Threat Model Using Tamarin Prover
    Ram, Singam Bhargav
    Odelu, Vanga
    2022 IEEE 12TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2022, : 667 - 672
  • [9] Detecting communication protocol security flaws by formal fuzz testing and machine learning
    Shu, Guoqiang
    Hsu, Yating
    Lee, David
    FORMAL TECHNIQUES FOR NETWORKED AND DISTRIBUTED SYSTEMS - FORTE 2008, 2008, 5048 : 299 - 304
  • [10] Soundness conditions for cryptographic algorithms and parameters abstractions in formal security protocol models
    Pironti, Alfredo
    Sisto, Riccardo
    DEPCOS - RELCOMEX 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DEPENDABILITY OF COMPUTER SYSTEMS, 2008, : 31 - 38