Unknown

Dataset Information

0

A model-guided symbolic execution approach for network protocol implementations and vulnerability detection.


ABSTRACT: Formal techniques have been devoted to analyzing whether network protocol specifications violate security policies; however, these methods cannot detect vulnerabilities in the implementations of the network protocols themselves. Symbolic execution can be used to analyze the paths of the network protocol implementations, but for stateful network protocols, it is difficult to reach the deep states of the protocol. This paper proposes a novel model-guided approach to detect vulnerabilities in network protocol implementations. Our method first abstracts a finite state machine (FSM) model, then utilizes the model to guide the symbolic execution. This approach achieves high coverage of both the code and the protocol states. The proposed method is implemented and applied to test numerous real-world network protocol implementations. The experimental results indicate that the proposed method is more effective than traditional fuzzing methods such as SPIKE at detecting vulnerabilities in the deep states of network protocol implementations.

SUBMITTER: Wen S 

PROVIDER: S-EPMC5690638 | biostudies-literature |

REPOSITORIES: biostudies-literature

Similar Datasets

| S-EPMC7480698 | biostudies-literature
| S-EPMC5648143 | biostudies-literature
| S-EPMC8848319 | biostudies-literature
| S-EPMC8786154 | biostudies-literature
| S-EPMC4155339 | biostudies-literature
| S-EPMC2919065 | biostudies-literature
| S-EPMC5703479 | biostudies-literature
| S-EPMC7952599 | biostudies-literature
| S-EPMC7462424 | biostudies-literature
| S-EPMC6110828 | biostudies-other