Song, J., Ma, Tiejun, Cadar, C. and Piezuch, P.
Rule-based verification of network protocol implementations using symbolic execution
At 20th International Conference on Computer Communications and Networks (ICCCN 2011), United States.
30 Jul - 04 Aug 2011.
Full text not available from this repository.
The secure and correct implementation of network protocols for resource discovery, device configuration and network management is complex and error-prone. Protocol specifications contain ambiguities, leading to implementation flaws and security vulnerabilities in network daemons. Such problems are hard to detect because they are often triggered by complex sequences of packets that occur only after prolonged operation. The goal of this work is to find semantic bugs in network daemons. Our approach is to replay a set of input packets that result in high source code coverage of the daemon and observe potential violations of rules derived from the protocol specification. We describe SYMNV, a practical verification tool that first symbolically executes a network daemon to generate high coverage input packets and then checks a set of rules constraining permitted input and output packets. We have applied SYMNV to three different implementations of the Zeroconf protocol and show that it is able to discover non-trivial bugs
Conference or Workshop Item
|Digital Object Identifier (DOI):
|Venue - Dates:
||20th International Conference on Computer Communications and Networks (ICCCN 2011), United States, 2011-07-30 - 2011-08-04
||Southampton Business School
||01 Dec 2011 10:16
||18 Apr 2017 01:08
|Further Information:||Google Scholar|
Actions (login required)