Enhancing Conformance Testing Using Symbolic Execution for Network Protocols

被引:5
|
作者
Song, JaeSeung [1 ]
Kim, Hyoungshick [2 ]
Park, Soojin [3 ]
机构
[1] Sejong Univ, Dept Comp & Informat Secur, Seoul, South Korea
[2] Sungkyunkwan Univ, Dept Comp Sci & Engn, Suwon, South Korea
[3] Sogang Univ, Grad Sch Management Technol, Seoul, South Korea
基金
新加坡国家研究基金会;
关键词
Conformance testing; Kerberos; protocol verification; symbolic execution; Telnet; test packet generation; SYSTEMS; AUTHENTICATION; GENERATION;
D O I
10.1109/TR.2015.2443392
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Security protocols are notoriously difficult to get right, and most go through several iterations before their hidden security vulnerabilities, which are hard to detect, are triggered. To help protocol designers and developers efficiently find non-trivial bugs, we introduce SYMCONF, a practical conformance testing tool that generates high-coverage test input packets using a conformance test suite and symbolic execution. Our approach can be viewed as the combination of conformance testing and symbolic execution: 1) it first selects symbolic inputs from an existing conformance test suite; 2) it then symbolically executes a network protocol implementation with the symbolic inputs; and 3) it finally generates high-coverage test input packets using a conformance test suite. We demonstrate the feasibility of this methodology by applying SYMCONF to the generation of a stream of high quality test input packets for multiple implementations of two network protocols, the Kerberos Telnet protocol and Dynamic Host Configuration Protocol (DHCP), and discovering non-trivial security bugs in the protocols.
引用
收藏
页码:1024 / 1037
页数:14
相关论文
共 50 条
  • [1] CONFORMANCE TESTING FOR OSI PROTOCOLS
    LINN, RJ
    COMPUTER NETWORKS AND ISDN SYSTEMS, 1990, 18 (03): : 203 - 219
  • [2] Monitor-based Testing of Network Protocol Implementations Using Symbolic Execution
    Asadian, Hooman
    Fiterau-Brostean, Paul
    Jonsson, Bengt
    Sagonas, Konstantinos
    19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024, 2024,
  • [3] AUTOMATED REGRESSION TESTING USING SYMBOLIC EXECUTION
    Barisas, Dominykas
    Milasius, Tomas
    Bareisa, Eduardas
    INFORMATION TECHNOLOGIES' 2011, 2011, : 117 - 124
  • [4] SYMBOLIC EXECUTION AND TESTING
    COWARD, PD
    INFORMATION AND SOFTWARE TECHNOLOGY, 1991, 33 (01) : 53 - 64
  • [5] Symbolic execution techniques for refinement testing
    Le Gall, Pascale
    Rapin, Nicolas
    Touil, Assia
    TESTS AND PROOFS, 2007, 4454 : 131 - +
  • [6] Enhancing Symbolic Execution with Veritesting
    Avgerinos, Thanassis
    Rebert, Alexandre
    Cha, Sang Kil
    Brumley, David
    36TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE 2014), 2014, : 1083 - 1094
  • [7] Testing Network Protocol Binary Software with Selective Symbolic Execution
    Wen, Shameng
    Feng, Chao
    Meng, Qingkun
    Zhang, Bin
    Wu, Ligeng
    Tang, Chaojing
    PROCEEDINGS OF 2016 12TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2016, : 318 - 322
  • [8] Path-guided conformance test case generation for models with data and time using symbolic execution techniques
    Bannour, Boutheina
    Lapitre, Arnault
    Le Gall, Pascale
    SCIENCE OF COMPUTER PROGRAMMING, 2025, 243
  • [9] A Conformance Testing Relation for Symbolic Timed Automata
    von Styp, Sabrina
    Bohnenkamp, Henrik
    Schmaltz, Julien
    FORMAL MODELING AND ANALYSIS OF TIMED SYSTEMS, 2010, 6246 : 243 - +
  • [10] The conformance testing METhodology for mobile communication protocols
    Luo, H
    ICCC2004: Proceedings of the 16th International Conference on Computer Communication Vol 1and 2, 2004, : 1458 - 1463