Protocol Vulnerability Analysis (draft)
نویسندگان
چکیده
Network protocols continue to suffer from well documented vulnerabilities. Despite this, a practical methodology for classifying these vulnerabilities does not exist. In this paper, we present such a methodology. We have developed a grammar for expressing network protocol exploits in terms of vulnerabilities and symptoms. Vulnerabilities are defined by characteristics, conditions which must hold for a vulnerability to exist. Symptoms are the violations of policy enabled by vulnerabilities. Exploits, then, are the pairing of vulnerabilities with their corresponding symptoms. Using our grammar, we analyzed many protocols and present our classifications visually using syntax trees. We detail the classification process, and discuss future applications of this work towards a secure protocol design framework.
منابع مشابه
Second Generation IMO Intact Stability Vulnerability Criteria and its Application to ships Navigating in Persian Gulf and Oman Sea
Second generation intact stability criteria for few past years had been under development by International Maritime Organization (IMO). Since the draft proposed amendments shall be amended to International code on Intact Stability (IS code 2008), new regulations shall enter into force for ships of length more than 24 meter. Generally second generation intact stability criteria (SGISC) refers to...
متن کاملResearch on Memory Access Vulnerability Analysis Technique in SCADA Protocol Implementation
SCADA systems play key roles in monitor and control of the critical infrastructures, the vulnerabilities existed in them may destroy the controlled critical infrastructures. This paper proposes an analysis method of memory access vulnerability in SCADA protocol implementation. Firstly, the memory taintedness model of SCADA protocol implementation is formally defined. Based on this model, the de...
متن کاملA Cryptographic Analysis of the TLS 1.3 draft-10 Full and Pre-shared Key Handshake Protocol
We analyze the handshake protocol of TLS 1.3 draft-ietf-tls-tls13-10 (published October 2015). This continues and extends our previous analysis (CCS 2015, Cryptology ePrint Archive 2015) of former TLS 1.3 drafts (draft-ietf-tls-tls13-05 and draft-ietf-tls-tls13-dh-based). Here we show that the full (EC)DHE Diffie–Hellman-based handshake of draft-10 is also secure in the multi-stage key exchange...
متن کاملUsing SPIN and Eclipse for Optimized High-Level Modeling and Analysis of Computer Network Attack Models [UNPUBLISHED DRAFT]
Advanced network attacks utilize complex, intertwined sequences of events on different hosts instead of just plain vulnerability exploitations. These sequences may contain protocol execution steps, attacker, and administrator actions. We propose a SPIN based approach for formal modeling and analysis of such attack sequences in scenarios where both protocol and network level aspects are relevant...
متن کاملVulnerability Discovery Technology and Its Applications
Vulnerability discovery technology becomes more and more important in software development and network security. This paper presents the classification of vulnerability discovery technologies and discusses the advantages, disadvantages and the extent of application of each class. Then we emphasize the procedure and the improvement methods of the Fuzzing test combined with protocol analysis. Fur...
متن کامل