• DocumentCode
    3388680
  • Title

    A model guided security vulnerability discovery approach for network protocol implementation

  • Author

    Tang, Wen ; Sui, Ai-Fen ; Schmid, Wolfgang

  • Author_Institution
    Corp. Technol., Siemens Ltd. China, Beijing, China
  • fYear
    2011
  • fDate
    25-28 Sept. 2011
  • Firstpage
    675
  • Lastpage
    680
  • Abstract
    Our modern society is increasingly depending on information and communication systems. This demands a high level of security and robustness on the implementations of network protocols. This paper presents a model-guided approach to discover security vulnerabilities of network protocol implementations. Our approach, resulted in security tool “Styx”, introduces mutation analysis and model checking into fuzz testing and provides a synthesized protocol security testing. And it not only can perform syntax testing on the input data validation component of protocol implementations, but also is able to model the behaviors of a protocol and automatically generate test traces for the verification of its internal implemented functions. To proof the concept, experiments with the open source implementation of IKE/ISAKMP have also been provided. The results show that Styx can effectively be used to discover security vulnerabilities from network protocol implementations.
  • Keywords
    protocols; telecommunication security; IKE-ISAKMP; Styx; communication systems; guided security vulnerability discovery model; information systems; mutation analysis; network protocol; protocol security testing; security vulnerabilities; testing; Analytical models; Data models; Protocols; Robustness; Security; Syntactics; Testing;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Communication Technology (ICCT), 2011 IEEE 13th International Conference on
  • Conference_Location
    Jinan
  • Print_ISBN
    978-1-61284-306-3
  • Type

    conf

  • DOI
    10.1109/ICCT.2011.6157962
  • Filename
    6157962