首页> 外文期刊>IEICE Transactions on Information and Systems >A State-Aware Protocol Fuzzer Based on Application-Layer Protocols
【24h】

A State-Aware Protocol Fuzzer Based on Application-Layer Protocols

机译:基于应用层协议的状态感知协议模糊器

获取原文
获取原文并翻译 | 示例
       

摘要

In the face of constant malicious attacks to network-connected software systems, software vulnerabilities need to be discovered early in the development phase. In this paper, we present AspFuzz, a state-aware protocol fuzzer based on the specifications of application-layer protocols. AspFuzz automatically generates anomalous messages that exploit possible vulnerabilities. The key observation behind AspFuzz is that most attack messages violate the strict specifications of application-layer protocols. For example, they do not conform to the rigid format or syntax required of each message. In addition, some attack messages ignore the protocol states and have incorrect orders of messages. AspFuzz automatically generates a large number of anomalous messages that deliberately violate the specifications of application-layer protocols. To demonstrate the effectiveness of AspFuzz, we conducted experiments with POP3 and HTTP servers. With AspFuzz, we can discover 20 reported and 1 previously unknown vulnerabilities for POP3 servers and 25 reported vulnerabilities for HTTP servers. Two vulnerabilities among these can be discovered by the state-awareness of AspFuzz. It can also find a SIP state-related vulnerability.
机译:面对对联网软件系统的持续恶意攻击,需要在开发阶段的早期就发现软件漏洞。在本文中,我们介绍了AspFuzz,这是一种基于应用程序层协议规范的状态感知协议模糊器。 AspFuzz自动生成利用可能存在的漏洞的异常消息。 AspFuzz背后的主要观察结果是,大多数攻击消息都违反了应用程序层协议的严格规范。例如,它们不符合每个消息所需的严格格式或语法。此外,某些攻击消息会忽略协议状态,并且消息顺序不正确。 AspFuzz自动生成大量异常消息,这些消息故意违反了应用程序层协议的规范。为了证明AspFuzz的有效性,我们对POP3和HTTP服务器进行了实验。借助AspFuzz,我们可以发现POP3服务器的20个报告的漏洞和1个以前未知的漏洞,以及HTTP服务器的25个报告的漏洞。通过AspFuzz的状态感知可以发现其中的两个漏洞。它还可以找到与SIP状态相关的漏洞。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号