首页> 外文期刊>IEICE transactions on information and systems >A State-Aware Protocol Fuzzer Based on Application-Layer Protocols
【24h】

A State-Aware Protocol Fuzzer Based on Application-Layer Protocols

机译:一种基于应用层协议的状态感知协议模糊

获取原文
       

摘要

In the face of constant malicious attacks to network-connected software systems, software vulnerabilities need to be discovered early in the development phase. In this paper, we present AspFuzz, a state-aware protocol fuzzer based on the specifications of application-layer protocols. AspFuzz automatically generates anomalous messages that exploit possible vulnerabilities. The key observation behind AspFuzz is that most attack messages violate the strict specifications of application-layer protocols. For example, they do not conform to the rigid format or syntax required of each message. In addition, some attack messages ignore the protocol states and have incorrect orders of messages. AspFuzz automatically generates a large number of anomalous messages that deliberately violate the specifications of application-layer protocols. To demonstrate the effectiveness of AspFuzz, we conducted experiments with POP3 and HTTP servers. With AspFuzz, we can discover 20 reported and 1 previously unknown vulnerabilities for POP3 servers and 25 reported vulnerabilities for HTTP servers. Two vulnerabilities among these can be discovered by the state-awareness of AspFuzz. It can also find a SIP state-related vulnerability.
机译:面对对网络连接的软件系统不断的恶意攻击,需要在开发阶段提前发现软件漏洞。在本文中,我们基于应用层协议的规范,存在ASPFuzz,一种状态感知协议模糊机。 ASPFuzz自动生成用于开发可能漏洞的异常消息。 ASPFuzz后面的关键观察是大多数攻击消息违反了应用层协议的严格规范。例如,它们不符合每个消息所需的刚性格式或语法。此外,某些攻击消息忽略协议状态并具有错误的消息令。 ASPFuzz会自动生成大量异常消息,故意违反应用程序层协议的规范。为了展示ASPFuzz的有效性,我们用POP3和HTTP服务器进行了实验。使用ASPFuzz,我们可以发现20报告的20个报告和1个以前为POP3服务器的未知漏洞,以及HTTP服务器的25个漏洞。可以通过aspfuzz的状态意识来发现这些漏洞。它还可以找到与SIP州相关的漏洞。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号