SYMBEXNET: Testing Network Protocol Implementations with Symbolic Execution and Rule-Based Specifications

被引:33
作者
Song, JaeSeung [1 ]
Cadar, Cristian [2 ]
Pietzuch, Peter [2 ]
机构
[1] Sejong Univ, Dept Comp & Informat Secur, Seoul, South Korea
[2] Univ London Imperial Coll Sci Technol & Med, Dept Comp, London SW7 2AZ, England
基金
英国工程与自然科学研究理事会;
关键词
Symbolic execution; network security; testing; interoperability testing; TEST SUITE DERIVATION; VERIFICATION;
D O I
10.1109/TSE.2014.2323977
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Implementations of network protocols, such as DNS, DHCP and Zeroconf, are prone to flaws, security vulnerabilities and interoperability issues caused by developer mistakes and ambiguous requirements in protocol specifications. Detecting such problems is not easy because (i) many bugs manifest themselves only after prolonged operation; (ii) reasoning about semantic errors requires a machine-readable specification; and (iii) the state space of complex protocol implementations is large. This article presents a novel approach that combines symbolic execution and rule-based specifications to detect various types of flaws in network protocol implementations. The core idea behind our approach is to (1) automatically generate high-coverage test input packets for a network protocol implementation using single-and multi-packet exchange symbolic execution (targeting stateless and stateful protocols, respectively) and then (2) use these packets to detect potential violations of manual rules derived from the protocol specification, and check the interoperability of different implementations of the same network protocol. We present a system based on these techniques, SYMBEXNET, and evaluate it on multiple implementations of two network protocols: Zeroconf, a service discovery protocol, and DHCP, a network configuration protocol. SYMBEXNET is able to discover non-trivial bugs as well as interoperability problems, most of which have been confirmed by the developers.
引用
收藏
页码:695 / 709
页数:15
相关论文
共 48 条
[1]  
Alexander Steve, 1997, 2132 RFC, VRFC
[2]  
Alur R, 2001, LECT NOTES COMPUT SC, V2102, P169
[3]  
[Anonymous], 2006, P 13 ACM C COMPUTER
[4]  
[Anonymous], 2011, P 20 INT C COMP COMM, DOI DOI 10.1109/ICCCN.2011.6005945
[5]  
[Anonymous], 2008, BLACK OPS 2008 ITS E
[6]  
Avallone S, 2004, INT CONF QUANT EVAL, P316
[7]  
Bradner S., 1997, 2119 IETF RFC
[8]  
Bradner S., 1996, 2026 IETF RFC
[9]  
Brenna Lars., 2007, SIGMOD 07, P1100, DOI DOI 10.1145/1247480.1247620
[10]  
Cadar C., 2008, Proceedings of the 8th USENIX conference on Operating systems design and implementation, OSDI'08, (USA), P209