Leveraging State Information for Automated Attack Discovery in Transport Protocol Implementations

DSN '15 Proceedings of the 2015 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks(2015)

引用 29|浏览37
暂无评分
摘要
We present a new method for finding attacks in unmodified transport protocol implementations using the specification of the protocol state machine to reduce the search space of possible attacks. Such reduction is obtained by appling malicious actions to all packets of the same type observed in the same state instead of applying them to individual packets. Our method requires knowledge of the packet formats and protocol state machine. We demonstrate our approach by developing SNAKE, a tool that automatically finds performance and resource exhaustion attacks on unmodified transport protocol implementations. SNAKE utilizes virtualization to run unmodified implementations in their intended environments and network emulation to create the network topology. SNAKE was able to find 9 attacks on 2 transport protocols, 5 of which we believe to be unknown in the literature.
更多
查看译文
关键词
Internet,computer network security,finite state machines,formal specification,protocols,telecommunication network topology,SNAKE,automated attack discovery,malicious action application,network emulation,network topology,packet formats,protocol state machine specification,resource exhaustion attacks,search space reduction,state information leverage,unmodified transport protocol implementations
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要