@conference {88, title = {Rule-based Verification of Network Protocol Implementations using Symbolic Execution}, booktitle = {20th IEEE International Conference on Computer Communications and Networks (ICCCN)}, year = {2011}, month = {07/2011}, publisher = {IEEE}, organization = {IEEE}, address = {Maui, Hawaii, USA}, abstract = {

The secure and correct implementation of network protocols for resource discovery, device configuration and network management is complex and error-prone. Protocol specifications contain ambiguities, leading to implementation flaws and security vulnerabilities in network daemons. Such problems are hard to detect because they are often triggered by complex sequences of packets that occur only after prolonged operation.

The goal of this work is to find semantic bugs in network daemons. Our approach is to replay a set of input packets that result in high source code coverage of the daemon and observe potential violations of rules derived from the protocol specification. We describe SYMNV, a practical verification tool that first symbolically executes a network daemon to generate highcoverage input packets and then checks a set of rules constraining permitted input and output packets. We have applied SYMNV to three different implementations of the Zeroconf protocol and show that it is able to discover non-trivial bugs.

}, keywords = {mvce}, url = {http://lsds.doc.ic.ac.uk/research/doc/icccn11-symnv.pdf}, author = {JaeSeung Song and Tiejun Ma and Cristian Cadar and Peter Pietzuch} }