首页> 外文期刊>IEEE transactions on dependable and secure computing >Exploiting Dissent: Towards Fuzzing-Based Differential Black-Box Testing of TLS Implementations
【24h】

Exploiting Dissent: Towards Fuzzing-Based Differential Black-Box Testing of TLS Implementations

机译:利用异议:朝着基于模糊的TLS实现的差动黑盒测试

获取原文
获取原文并翻译 | 示例
           

摘要

The Transport Layer Security (TLS) protocol is one of the most widely used security protocols on the internet. Yet do implementations of TLS keep on suffering from bugs and security vulnerabilities. In large part is this due to the protocol's complexity which makes implementing and testing TLS notoriously difficult. In this paper, we present our work on using differential testing as effective means to detect issues in black-box implementations of the TLS handshake protocol. We introduce a novel fuzzing algorithm for generating large and diverse corpuses of mostly-valid TLS handshake messages. Stimulating TLS servers when expecting a ClientHello message, we find messages generated with our algorithm to induce more response discrepancies and to achieve a higher code coverage than those generated with American Fuzzy Lop, TLS-Attacker, or NEZHA. In particular, we apply our approach to OpenSSL, BoringSSL, WolfSSL, mbedTLS, and MatrixSSL, and find several real implementation bugs; among them a serious vulnerability in MatrixSSL 3.8.4. Besides do our findings point to imprecision in the TLS specification. We see our approach as presented in this paper as the first step towards fully interactive differential testing of black-box TLS protocol implementations. Our software tools are publicly available as open source projects.
机译:传输层安全性(TLS)协议是Internet上使用最广泛使用的安全协议之一。然而,TLS的实施继续患有错误和安全漏洞。在很大程度上是这样,由于议定书的复杂性,这使得难以困难地实现和测试TL。在本文中,我们在使用差动测试作为检测TLS握手协议的黑匣子实现中的有效手段的有效手段的工作。我们介绍了一种新颖的模糊算法,用于产生大多数有效的TLS握手消息的大型和多样化的核心。在期待ClientHello消息时刺激TLS服务器,我们发现使用算法生成的消息,以引起更多响应差异,并实现比使用美国模糊源,TLS攻击者或Nezha产生的更高的代码覆盖。特别是,我们将我们的方法应用于OpenSSL,Boringsl,Wolfssl,Medtls和MatrixSL,并找到了几个真实的实现错误;其中在矩阵中的严重漏洞3.8.4。除了我们的发现表明TLS规范中的不精确。我们认为我们的方法如本文所展示的黑盒TLS协议实现完全交互差分测试的第一步。我们的软件工具被公开可用作开源项目。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号