Cargando…
A model-guided symbolic execution approach for network protocol implementations and vulnerability detection
Formal techniques have been devoted to analyzing whether network protocol specifications violate security policies; however, these methods cannot detect vulnerabilities in the implementations of the network protocols themselves. Symbolic execution can be used to analyze the paths of the network prot...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Public Library of Science
2017
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5690638/ https://www.ncbi.nlm.nih.gov/pubmed/29145458 http://dx.doi.org/10.1371/journal.pone.0188229 |
_version_ | 1783279644920774656 |
---|---|
author | Wen, Shameng Meng, Qingkun Feng, Chao Tang, Chaojing |
author_facet | Wen, Shameng Meng, Qingkun Feng, Chao Tang, Chaojing |
author_sort | Wen, Shameng |
collection | PubMed |
description | Formal techniques have been devoted to analyzing whether network protocol specifications violate security policies; however, these methods cannot detect vulnerabilities in the implementations of the network protocols themselves. Symbolic execution can be used to analyze the paths of the network protocol implementations, but for stateful network protocols, it is difficult to reach the deep states of the protocol. This paper proposes a novel model-guided approach to detect vulnerabilities in network protocol implementations. Our method first abstracts a finite state machine (FSM) model, then utilizes the model to guide the symbolic execution. This approach achieves high coverage of both the code and the protocol states. The proposed method is implemented and applied to test numerous real-world network protocol implementations. The experimental results indicate that the proposed method is more effective than traditional fuzzing methods such as SPIKE at detecting vulnerabilities in the deep states of network protocol implementations. |
format | Online Article Text |
id | pubmed-5690638 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2017 |
publisher | Public Library of Science |
record_format | MEDLINE/PubMed |
spelling | pubmed-56906382017-11-30 A model-guided symbolic execution approach for network protocol implementations and vulnerability detection Wen, Shameng Meng, Qingkun Feng, Chao Tang, Chaojing PLoS One Research Article Formal techniques have been devoted to analyzing whether network protocol specifications violate security policies; however, these methods cannot detect vulnerabilities in the implementations of the network protocols themselves. Symbolic execution can be used to analyze the paths of the network protocol implementations, but for stateful network protocols, it is difficult to reach the deep states of the protocol. This paper proposes a novel model-guided approach to detect vulnerabilities in network protocol implementations. Our method first abstracts a finite state machine (FSM) model, then utilizes the model to guide the symbolic execution. This approach achieves high coverage of both the code and the protocol states. The proposed method is implemented and applied to test numerous real-world network protocol implementations. The experimental results indicate that the proposed method is more effective than traditional fuzzing methods such as SPIKE at detecting vulnerabilities in the deep states of network protocol implementations. Public Library of Science 2017-11-16 /pmc/articles/PMC5690638/ /pubmed/29145458 http://dx.doi.org/10.1371/journal.pone.0188229 Text en © 2017 Wen et al http://creativecommons.org/licenses/by/4.0/ This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0/) , which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited. |
spellingShingle | Research Article Wen, Shameng Meng, Qingkun Feng, Chao Tang, Chaojing A model-guided symbolic execution approach for network protocol implementations and vulnerability detection |
title | A model-guided symbolic execution approach for network protocol implementations and vulnerability detection |
title_full | A model-guided symbolic execution approach for network protocol implementations and vulnerability detection |
title_fullStr | A model-guided symbolic execution approach for network protocol implementations and vulnerability detection |
title_full_unstemmed | A model-guided symbolic execution approach for network protocol implementations and vulnerability detection |
title_short | A model-guided symbolic execution approach for network protocol implementations and vulnerability detection |
title_sort | model-guided symbolic execution approach for network protocol implementations and vulnerability detection |
topic | Research Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5690638/ https://www.ncbi.nlm.nih.gov/pubmed/29145458 http://dx.doi.org/10.1371/journal.pone.0188229 |
work_keys_str_mv | AT wenshameng amodelguidedsymbolicexecutionapproachfornetworkprotocolimplementationsandvulnerabilitydetection AT mengqingkun amodelguidedsymbolicexecutionapproachfornetworkprotocolimplementationsandvulnerabilitydetection AT fengchao amodelguidedsymbolicexecutionapproachfornetworkprotocolimplementationsandvulnerabilitydetection AT tangchaojing amodelguidedsymbolicexecutionapproachfornetworkprotocolimplementationsandvulnerabilitydetection AT wenshameng modelguidedsymbolicexecutionapproachfornetworkprotocolimplementationsandvulnerabilitydetection AT mengqingkun modelguidedsymbolicexecutionapproachfornetworkprotocolimplementationsandvulnerabilitydetection AT fengchao modelguidedsymbolicexecutionapproachfornetworkprotocolimplementationsandvulnerabilitydetection AT tangchaojing modelguidedsymbolicexecutionapproachfornetworkprotocolimplementationsandvulnerabilitydetection |