Ontology highlight
ABSTRACT:
SUBMITTER: Wen S
PROVIDER: S-EPMC5690638 | biostudies-literature | 2017
REPOSITORIES: biostudies-literature
Wen Shameng S Meng Qingkun Q Feng Chao C Tang Chaojing C
PloS one 20171116 11
Formal techniques have been devoted to analyzing whether network protocol specifications violate security policies; however, these methods cannot detect vulnerabilities in the implementations of the network protocols themselves. Symbolic execution can be used to analyze the paths of the network protocol implementations, but for stateful network protocols, it is difficult to reach the deep states of the protocol. This paper proposes a novel model-guided approach to detect vulnerabilities in netwo ...[more]