Rule-based verification of network protocol implementations using symbolic execution
Song, J., Ma, Tiejun, Cadar, C. and Piezuch, P. (2011) Rule-based verification of network protocol implementations using symbolic execution. In, 20th International Conference on Computer Communications and Networks (ICCCN 2011), Maui County, US, 30 Jul - 04 Aug 2011. New York, US, Institute of Electrical and Electronics Engineers, 1-8. (doi:10.1109/ICCCN.2011.6005945).
Full text not available from this repository.
The secure and correct implementation of network protocols for resource discovery, device configuration and network management is complex and error-prone. Protocol specifications contain ambiguities, leading to implementation flaws and security vulnerabilities in network daemons. Such problems are hard to detect because they are often triggered by complex sequences of packets that occur only after prolonged operation. The goal of this work is to find semantic bugs in network daemons. Our approach is to replay a set of input packets that result in high source code coverage of the daemon and observe potential violations of rules derived from the protocol specification. We describe SYMNV, a practical verification tool that first symbolically executes a network daemon to generate high coverage input packets and then checks a set of rules constraining permitted input and output packets. We have applied SYMNV to three different implementations of the Zeroconf protocol and show that it is able to discover non-trivial bugs
|Item Type:||Conference or Workshop Item (Paper)|
|Digital Object Identifier (DOI):||doi:10.1109/ICCCN.2011.6005945|
|Subjects:||Q Science > QA Mathematics > QA76 Computer software
Z Bibliography. Library Science. Information Resources > ZA Information resources
|Divisions:||Faculty of Business and Law > Southampton Business School
|Date Deposited:||01 Dec 2011 10:16|
|Last Modified:||31 Mar 2016 13:47|
|RDF:||RDF+N-Triples, RDF+N3, RDF+XML, Browse.|
Actions (login required)