• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

一种用于网络协议实现和漏洞检测的模型引导符号执行方法。

A model-guided symbolic execution approach for network protocol implementations and vulnerability detection.

作者信息

Wen Shameng, Meng Qingkun, Feng Chao, Tang Chaojing

机构信息

College of Electronic Science and Engineering, National University of Defense Technology, Changsha, China.

出版信息

PLoS One. 2017 Nov 16;12(11):e0188229. doi: 10.1371/journal.pone.0188229. eCollection 2017.

DOI:10.1371/journal.pone.0188229
PMID:29145458
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC5690638/
Abstract

Formal techniques have been devoted to analyzing whether network protocol specifications violate security policies; however, these methods cannot detect vulnerabilities in the implementations of the network protocols themselves. Symbolic execution can be used to analyze the paths of the network protocol implementations, but for stateful network protocols, it is difficult to reach the deep states of the protocol. This paper proposes a novel model-guided approach to detect vulnerabilities in network protocol implementations. Our method first abstracts a finite state machine (FSM) model, then utilizes the model to guide the symbolic execution. This approach achieves high coverage of both the code and the protocol states. The proposed method is implemented and applied to test numerous real-world network protocol implementations. The experimental results indicate that the proposed method is more effective than traditional fuzzing methods such as SPIKE at detecting vulnerabilities in the deep states of network protocol implementations.

摘要

形式化技术已被用于分析网络协议规范是否违反安全策略;然而,这些方法无法检测网络协议自身实现中的漏洞。符号执行可用于分析网络协议实现的路径,但对于有状态的网络协议,很难达到协议的深层状态。本文提出一种新颖的模型引导方法来检测网络协议实现中的漏洞。我们的方法首先抽象出一个有限状态机(FSM)模型,然后利用该模型引导符号执行。这种方法在代码和协议状态方面都实现了高覆盖率。所提出的方法已被实现并应用于测试众多实际的网络协议实现。实验结果表明,所提出的方法在检测网络协议实现深层状态中的漏洞方面比传统的模糊测试方法(如SPIKE)更有效。

https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2ba9/5690638/bdba5d0e4484/pone.0188229.g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2ba9/5690638/a14dd0ab46b8/pone.0188229.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2ba9/5690638/5828ad1dd51c/pone.0188229.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2ba9/5690638/3fbe8a55def1/pone.0188229.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2ba9/5690638/a9e92cf4e0ce/pone.0188229.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2ba9/5690638/4f643bca4b7f/pone.0188229.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2ba9/5690638/eb8ca0b2ce68/pone.0188229.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2ba9/5690638/675940557264/pone.0188229.g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2ba9/5690638/294381ce4e1f/pone.0188229.g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2ba9/5690638/ff6a99ee7c76/pone.0188229.g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2ba9/5690638/bdba5d0e4484/pone.0188229.g010.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2ba9/5690638/a14dd0ab46b8/pone.0188229.g001.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2ba9/5690638/5828ad1dd51c/pone.0188229.g002.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2ba9/5690638/3fbe8a55def1/pone.0188229.g003.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2ba9/5690638/a9e92cf4e0ce/pone.0188229.g004.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2ba9/5690638/4f643bca4b7f/pone.0188229.g005.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2ba9/5690638/eb8ca0b2ce68/pone.0188229.g006.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2ba9/5690638/675940557264/pone.0188229.g007.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2ba9/5690638/294381ce4e1f/pone.0188229.g008.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2ba9/5690638/ff6a99ee7c76/pone.0188229.g009.jpg
https://cdn.ncbi.nlm.nih.gov/pmc/blobs/2ba9/5690638/bdba5d0e4484/pone.0188229.g010.jpg

相似文献

1
A model-guided symbolic execution approach for network protocol implementations and vulnerability detection.一种用于网络协议实现和漏洞检测的模型引导符号执行方法。
PLoS One. 2017 Nov 16;12(11):e0188229. doi: 10.1371/journal.pone.0188229. eCollection 2017.
2
Protocol vulnerability detection based on network traffic analysis and binary reverse engineering.基于网络流量分析和二进制逆向工程的协议漏洞检测
PLoS One. 2017 Oct 19;12(10):e0186188. doi: 10.1371/journal.pone.0186188. eCollection 2017.
3
Coverage-guided differential testing of TLS implementations based on syntax mutation.基于语法突变的 TLS 实现的覆盖引导差异测试。
PLoS One. 2022 Jan 24;17(1):e0262176. doi: 10.1371/journal.pone.0262176. eCollection 2022.
4
A systematic review of fuzzing based on machine learning techniques.基于机器学习技术的模糊测试系统综述。
PLoS One. 2020 Aug 18;15(8):e0237749. doi: 10.1371/journal.pone.0237749. eCollection 2020.
5
FSM-F: Finite State Machine Based Framework for Denial of Service and Intrusion Detection in MANET.FSM-F:用于移动自组网中拒绝服务和入侵检测的基于有限状态机的框架。
PLoS One. 2016 Jun 10;11(6):e0156885. doi: 10.1371/journal.pone.0156885. eCollection 2016.
6
Vulnerability-oriented directed fuzzing for binary programs.面向漏洞的二进制程序定向模糊测试。
Sci Rep. 2022 Mar 11;12(1):4271. doi: 10.1038/s41598-022-07355-5.
7
MultiFuzz: A Coverage-Based Multiparty-Protocol Fuzzer for IoT Publish/Subscribe Protocols.MultiFuzz:一种用于物联网发布/订阅协议的基于覆盖的多方协议模糊测试器。
Sensors (Basel). 2020 Sep 11;20(18):5194. doi: 10.3390/s20185194.
8
Configuration Fuzzing for Software Vulnerability Detection.用于软件漏洞检测的配置模糊测试
Proc Int Conf Availab Reliab Secur. 2010 Feb 15:525-530. doi: 10.1109/ares.2010.22.
9
CONFU: Configuration Fuzzing Testing Framework for Software Vulnerability Detection.CONFU:用于软件漏洞检测的配置模糊测试框架。
Int J Secur Softw Eng. 2010;1(3):41-55. doi: 10.4018/jsse.2010070103.
10
Ffuzz: Towards full system high coverage fuzz testing on binary executables.Ffuzz:二进制可执行文件的全系统高覆盖率模糊测试方法。
PLoS One. 2018 May 23;13(5):e0196733. doi: 10.1371/journal.pone.0196733. eCollection 2018.

本文引用的文献

1
Beyond Pressure Gradients: The Effects of Intervention on Heart Power in Aortic Coarctation.超越压力梯度:干预对主动脉缩窄患者心脏功率的影响
PLoS One. 2017 Jan 12;12(1):e0168487. doi: 10.1371/journal.pone.0168487. eCollection 2017.