2011 Third International Conference on Multimedia Information Networking and Security 2011
DOI: 10.1109/mines.2011.143
|View full text |Cite
|
Sign up to set email alerts
|

Extension of SPIKE for Encrypted Protocol Fuzzing

Abstract: A fuzzer is a program that attempts to find security vulnerabilities in an application by sending random or semi-random input. Fuzzers have been widely used to find vulnerabilities in protocol implementations. The implementations may conform to the design of the protocol, but most of the times some glitches might remain. As a result vulnerabilities might remain unnoticed. Consequently, different implementations of the same protocol may be vulnerable to different kind of attacks. Fuzzers help us discover such i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…Fuzzing can detect implementation level flaws, but it cannot find design issues. For example, fuzzing can detect buffer overflow, but it cannot detect the use of weak encryption algorithm [15]. In terms of cryptographic protocols, we can fuzz a running protocol that uses encryption with invalid packets and check the connection behavior of the client and server.…”
Section: Fuzzingmentioning
confidence: 99%
See 1 more Smart Citation
“…Fuzzing can detect implementation level flaws, but it cannot find design issues. For example, fuzzing can detect buffer overflow, but it cannot detect the use of weak encryption algorithm [15]. In terms of cryptographic protocols, we can fuzz a running protocol that uses encryption with invalid packets and check the connection behavior of the client and server.…”
Section: Fuzzingmentioning
confidence: 99%
“…One of the weaknesses of CDF is that it provides limited detection of timing leaks. ESPIKE [15] is another fuzzing tool, which is an extension of SPIKE; it is designed to handle encrypted protocols by sending all the SPIKE data through the SSL layer. The limitation of SPIKE is that it is only valid for the protocols that are already compatible with SPIKE.…”
Section: Limitations Related Work and Future Directionsmentioning
confidence: 99%
“…From 2002 till now, fuzz testing tools emerge in an endless stream, and they are oriented to different aspects. For example, the browser-oriented managleme [10], the FileFuzz [11] and SPIKEfile [12] are designed for the format file. After that, the focus of fuzz testing shifts to the framework optimization.…”
Section: Fuzz Testingmentioning
confidence: 99%