首页> 外文会议>IEEE International Military Communications Conference >SECURITY VULNERABILITIES ASSESSMENT OF THE X.509 PROTOCOL BY SYNTAX-BASED TESTING
【24h】

SECURITY VULNERABILITIES ASSESSMENT OF THE X.509 PROTOCOL BY SYNTAX-BASED TESTING

机译:Syntax的测试安全漏洞评估X.509协议

获取原文

摘要

This paper describes a methodology for syntax-based vulnerability testing of computer-network protocol implementations, by mutating the protocol data units (PDUs) transmitted to the target implementation. The implementers of a protocol are under a number of different constraints: time, budget, throughput and memory footprint-size. Adequate attention to secure handling of data structures in a PDU can give way to other pressures. The implementation may be designed to meet conformance-testing cases but can have open vulnerabilities to more obscure cases that might not even be possible during normal operation of the protocol The vulnerabilities can lead to a compromise of the target's security, e.g. buffer overflow. The vulnerability testing approach described in this paper manipulates the grammar of the targeted network protocol to generate a large number of mutated test-cases that can be used to identify security vulnerabilities. This work builds on that of Beizer and the PROTOS research group who propose a functional method for assessing protocol implementation security. It adopts a more general approach in its modelling of protocols in order to take advantage of similarities between protocol data structures and to better utilise common abstract syntax constructs (in this case ASN.1), and common transfer syntaxes. It focuses on the mutation of a representation of PDU syntax that is derived from actual protocol PDUs "by example" rather than by specifying and mutating the grammar for the protocol itself. This results in the production of a more universal testing tool applicable to many ASN.1-based protocols with little or no modification. The methodology and tools developed as part of this work were used with success to test a number of network protocols, including a commercial product using ASN.1-Specified X.509 public key certificates.
机译:本文通过突变发送到目标实现的协议数据单元(PDU)来介绍计算机网络协议实现的基于语法的漏洞测试的方法。协议的实施者在许多不同的约束下:时间,预算,吞吐量和内存占用尺寸。充分注意PDU中的数据结构的安全处理可以使涉及其他压力。该实现可以设计成满足符合测试用例,但可以在协议的正常运行期间甚至可能在漏洞期间不可能的更模糊的漏洞,这可能导致目标安全性的折衷,例如,甚至可能无法进行更模糊的情况。缓冲区溢出。本文中描述的漏洞测试方法操纵了目标网络协议的语法,以产生可用于识别安全漏洞的大量突变测试案例。这项工作建立了北方能力和普罗斯研究组的建议,他提出了一种用于评估协议实施安全的功能方法。它在其对协议的建模中采用更一般的方法,以便利用协议数据结构之间的相似性,并更好地利用常见的抽象语法构造(在本例中为ASN.1)和公共传输语法。它侧重于PDU语法的表示的突变,该突变是从实际协议PDU“通过示例”而不是通过指定和突变协议本身的语法。这导致生产更普遍的测试工具,适用于许多基于ASN.1的协议,几乎没有修改。作为本工作的一部分开发的方法和工具与成功用于测试许多网络协议,包括使用ASN.1指定的X.509公钥证书的商业产品。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号