Enhancing Conformance Testing Using Symbolic Execution for Network Protocols

被引:5
|
作者
Song, JaeSeung [1 ]
Kim, Hyoungshick [2 ]
Park, Soojin [3 ]
机构
[1] Sejong Univ, Dept Comp & Informat Secur, Seoul, South Korea
[2] Sungkyunkwan Univ, Dept Comp Sci & Engn, Suwon, South Korea
[3] Sogang Univ, Grad Sch Management Technol, Seoul, South Korea
基金
新加坡国家研究基金会;
关键词
Conformance testing; Kerberos; protocol verification; symbolic execution; Telnet; test packet generation; SYSTEMS; AUTHENTICATION; GENERATION;
D O I
10.1109/TR.2015.2443392
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security protocols are notoriously difficult to get right, and most go through several iterations before their hidden security vulnerabilities, which are hard to detect, are triggered. To help protocol designers and developers efficiently find non-trivial bugs, we introduce SYMCONF, a practical conformance testing tool that generates high-coverage test input packets using a conformance test suite and symbolic execution. Our approach can be viewed as the combination of conformance testing and symbolic execution: 1) it first selects symbolic inputs from an existing conformance test suite; 2) it then symbolically executes a network protocol implementation with the symbolic inputs; and 3) it finally generates high-coverage test input packets using a conformance test suite. We demonstrate the feasibility of this methodology by applying SYMCONF to the generation of a stream of high quality test input packets for multiple implementations of two network protocols, the Kerberos Telnet protocol and Dynamic Host Configuration Protocol (DHCP), and discovering non-trivial security bugs in the protocols.
引用
下载
收藏
页码:1024 / 1037
页数:14
相关论文
共 50 条
  • [1] VERIFICATION OF PROTOCOLS USING SYMBOLIC EXECUTION
    BRAND, D
    JOYNER, WH
    COMPUTER NETWORKS AND ISDN SYSTEMS, 1978, 2 (4-5): : 351 - 360
  • [2] Using passive testing based on symbolic execution and slicing techniques: Application to the validation of communication protocols
    Mouttappa, Pramila
    Maag, Stephane
    Cavalli, Ana
    COMPUTER NETWORKS, 2013, 57 (15) : 2992 - 3008
  • [3] CONFORMANCE TESTING FOR OSI PROTOCOLS
    LINN, RJ
    COMPUTER NETWORKS AND ISDN SYSTEMS, 1990, 18 (03): : 203 - 219
  • [4] Conformance testing of DECT protocols
    Tarnay, K
    Rotter, CV
    EUROMICRO SUMMER SCHOOL ON MOBILE COMPUTING'98, 1998, 183 : 133 - 143
  • [5] Symbolic Execution of Network Software Based on Unit Testing
    Zhou Lin
    Liu Fei
    Gan Shuitao
    Qin Xiaojun
    Han Wenbao
    2014 9TH IEEE INTERNATIONAL CONFERENCE ON NETWORKING, ARCHITECTURE, AND STORAGE (NAS), 2014, : 128 - 132
  • [6] AUTOMATED REGRESSION TESTING USING SYMBOLIC EXECUTION
    Barisas, Dominykas
    Milasius, Tomas
    Bareisa, Eduardas
    INFORMATION TECHNOLOGIES' 2011, 2011, : 117 - 124
  • [7] Automated Regression Testing using Symbolic Execution
    Barisas, D.
    Milasius, T.
    Bareisa, E.
    ELEKTRONIKA IR ELEKTROTECHNIKA, 2011, (06) : 101 - 105
  • [8] PROGRAM TESTING USING SYMBOLIC EXECUTION.
    Borzov, Yu.V.
    Programming and Computer Software (English Translation of Programmirovanie), 1980, 6 (01): : 39 - 45
  • [9] SYMBOLIC EXECUTION AND TESTING
    COWARD, PD
    INFORMATION AND SOFTWARE TECHNOLOGY, 1991, 33 (01) : 53 - 64
  • [10] Enhancing Symbolic Execution with Veritesting
    Avgerinos, Thanassis
    Rebert, Alexandre
    Cha, Sang Kil
    Brumley, David
    36TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2014), 2014, : 1083 - 1094