Paul Fiterau-Brostean (Uppsala University, Sweden), Bengt Jonsson (Uppsala University, Sweden), Konstantinos Sagonas (Uppsala University, Sweden and National Technical University of Athens, Greece), Fredrik Tåquist (Uppsala University, Sweden)

Implementations of stateful security protocols
must carefully manage the type and order of exchanged messages and cryptographic material,
by maintaining a state machine which keeps track of protocol progress.
Corresponding implementation flaws, called
emph{state machine bugs}, can constitute serious security vulnerabilities.
We present an automated black-box technique for detecting state machine bugs in implementations of stateful network protocols.
It takes as input a catalogue of state machine bugs for the protocol, each specified as a finite automaton which accepts
sequences of messages that exhibit the bug, and a (possibly inaccurate) model of the implementation under test,
typically obtained by model learning.
Our technique constructs the set of sequences that (according to the model) can be performed by the implementation and
that (according to the automaton) expose the bug.
These sequences are then transformed to test cases on the actual implementation to find a witness for the bug or filter out false alarms.
We have applied our technique on three widely-used implementations of SSH servers and nine different DTLS server and client implementations, including their most recent versions.
Our technique easily reproduced all bugs identified by security researchers before,
and produced witnesses for them.
More importantly, it revealed several previously unknown bugs in the same implementations,
two new vulnerabilities, and a variety of new bugs and non-conformance issues
in newer versions of the same SSH and DTLS implementations.

View More Papers

PPA: Preference Profiling Attack Against Federated Learning

Chunyi Zhou (Nanjing University of Science and Technology), Yansong Gao (Nanjing University of Science and Technology), Anmin Fu (Nanjing University of Science and Technology), Kai Chen (Chinese Academy of Science), Zhiyang Dai (Nanjing University of Science and Technology), Zhi Zhang (CSIRO's Data61), Minhui Xue (CSIRO's Data61), Yuqing Zhang (University of Chinese Academy of Science)

Read More

OBI: a multi-path oblivious RAM for forward-and-backward-secure searchable encryption

Zhiqiang Wu (Changsha University of Science and Technology), Rui Li (Dongguan University of Technology)

Read More

Post-GDPR Threat Hunting on Android Phones: Dissecting OS-level Safeguards...

Mark Huasong Meng (National University of Singapore), Qing Zhang (ByteDance), Guangshuai Xia (ByteDance), Yuwei Zheng (ByteDance), Yanjun Zhang (The University of Queensland), Guangdong Bai (The University of Queensland), Zhi Liu (ByteDance), Sin G. Teo (Agency for Science, Technology and Research), Jin Song Dong (National University of Singapore)

Read More

Ghost Domain Reloaded: Vulnerable Links in Domain Name Delegation...

Xiang Li (Tsinghua University), Baojun Liu (Tsinghua University), Xuesong Bai (University of California, Irvine), Mingming Zhang (Tsinghua University), Qifan Zhang (University of California, Irvine), Zhou Li (University of California, Irvine), Haixin Duan (Tsinghua University; QI-ANXIN Technology Research Institute; Zhongguancun Laboratory), Qi Li (Tsinghua University; Zhongguancun Laboratory)

Read More