Cryptographic protocol conformance testing based on domain-specific state machine

被引:0
|
作者
Prokopev, Sergey [1 ,2 ]
机构
[1] RAS, Ivannikov Inst Syst Programming, Moscow, Russia
[2] JSC NPK Kryptonite, Moscow, Russia
关键词
Model-based testing; Cryptographic protocol conformance testing; Domain-specific state machine; DSL embedded in Haskell; Sequences fuzzing;
D O I
10.1007/s11416-023-00474-1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We present a method of conformance testing of the cryptographic protocol implementations that ensures a high degree of automation of the testing process and provides criteria for the quality assessment of the generated test suites. Our method is based on a kind of extended (non-finite) state machine which is specifically designed for the domain of cryptographic protocols. The key concept of the proposed machine is a built-in mechanism of sequences, which, firstly, sets an effective way to deal with the nondeterminism inherent in cryptographic protocols and, secondly, provides the means to express "inconvenient" (for the high-level declarative languages) requirements, such as e.g. "take the concatenation of the specified parts of all the previous messages which meet specified condition". Basing on this machine, we propose a high-level declarative language (embedded in Haskell) intended for development of interoperable protocol specifications used as input data for our testing tool. The protocol specification consists of two parts: a description of the structure of the protocol messages (this part, by virtue of its conciseness and declarativeness, can be directly incorporated in the primary specifications such as RFC) and a set of state machine transition functions binded to the sequences. In the paper, we present the principles of building of our machine and introduce the notion of sequences fuzzing. The proposed approach was successfully approved for the industrial cryptographic protocol TLS.
引用
收藏
页码:249 / 259
页数:11
相关论文
共 50 条
  • [1] Cryptographic protocol conformance testing based on domain-specific state machine
    Sergey Prokopev
    [J]. Journal of Computer Virology and Hacking Techniques, 2024, 20 : 249 - 259
  • [2] A domain-specific language for cryptographic protocols based on streams
    Juerjens, Jan
    [J]. JOURNAL OF LOGIC AND ALGEBRAIC PROGRAMMING, 2009, 78 (02): : 54 - 73
  • [3] FINITE STATE MACHINE BASED FORMAL METHODS IN PROTOCOL CONFORMANCE TESTING - FROM THEORY TO IMPLEMENTATION
    BOSIK, BS
    UYAR, MU
    [J]. COMPUTER NETWORKS AND ISDN SYSTEMS, 1991, 22 (01): : 7 - 33
  • [4] NONDETERMINISTIC STATE MACHINES IN PROTOCOL CONFORMANCE TESTING
    PETRENKO, A
    YEVTUSHENKO, N
    LEBEDEV, A
    DAS, A
    [J]. PROTOCOL TEST SYSTEMS, VI, 1994, 19 : 363 - 378
  • [5] Protocol-Based Interactive Debugging for Domain-Specific Languages
    Enet, Josselin
    Bousse, Erwan
    Tisi, Massimo
    Sunye, Gerson
    [J]. JOURNAL OF OBJECT TECHNOLOGY, 2023, 22 (02):
  • [6] Domain-Specific Networks for Machine Learning
    Abts, Dennis
    [J]. 2020 14TH IEEE/ACM INTERNATIONAL SYMPOSIUM ON NETWORKS-ON-CHIP (NOCS), 2020,
  • [7] Unit Testing for Domain-Specific Languages
    Wu, Hui
    Gray, Jeff
    Mernik, Marjan
    [J]. DOMAIN-SPECIFIC LANGUAGES, PROCEEDINGS, 2009, 5658 : 125 - +
  • [8] A Textual Domain-Specific Language Based on the UML Testing Profile
    Iber, Johannes
    Kajtazovic, Nermin
    Macher, Georg
    Hoeller, Andrea
    Rauter, Tobias
    Kreiner, Christian
    [J]. MODEL-DRIVEN ENGINEERING AND SOFTWARE DEVELOPMENT (MODELSWARD 2015), 2015, 580 : 155 - 171
  • [9] Improving active Mealy machine learning for protocol conformance testing
    Fides Aarts
    Harco Kuppens
    Jan Tretmans
    Frits Vaandrager
    Sicco Verwer
    [J]. Machine Learning, 2014, 96 : 189 - 224
  • [10] Building Domain-Specific Machine Learning Workflows: A Conceptual Framework for the State of the Practice
    Oakes, Bentley James
    Famelis, Michalis
    Sahraoui, Houari
    [J]. ACM TRANSACTIONS ON SOFTWARE ENGINEERING AND METHODOLOGY, 2024, 33 (04)