Rule-based verification of network protocol implementations using symbolic execution

Song, J., Ma, Tiejun, Cadar, C. and Piezuch, P. (2011) Rule-based verification of network protocol implementations using symbolic execution. In, 20th International Conference on Computer Communications and Networks (ICCCN 2011), Maui County, US, 30 Jul - 04 Aug 2011. New York, US, Institute of Electrical and Electronics Engineers, 1-8. (doi:10.1109/ICCCN.2011.6005945).


Full text not available from this repository.


The secure and correct implementation of network protocols for resource discovery, device configuration and network management is complex and error-prone. Protocol specifications contain ambiguities, leading to implementation flaws and security vulnerabilities in network daemons. Such problems are hard to detect because they are often triggered by complex sequences of packets that occur only after prolonged operation. The goal of this work is to find semantic bugs in network daemons. Our approach is to replay a set of input packets that result in high source code coverage of the daemon and observe potential violations of rules derived from the protocol specification. We describe SYMNV, a practical verification tool that first symbolically executes a network daemon to generate high coverage input packets and then checks a set of rules constraining permitted input and output packets. We have applied SYMNV to three different implementations of the Zeroconf protocol and show that it is able to discover non-trivial bugs

Item Type: Conference or Workshop Item (Paper)
Digital Object Identifier (DOI): doi:10.1109/ICCCN.2011.6005945
Subjects: Q Science > QA Mathematics > QA76 Computer software
Z Bibliography. Library Science. Information Resources > ZA Information resources
Divisions : Faculty of Business and Law > Southampton Business School
ePrint ID: 204603
Accepted Date and Publication Date:
Date Deposited: 01 Dec 2011 10:16
Last Modified: 31 Mar 2016 13:47

Actions (login required)

View Item View Item