2018
DOI: 10.3233/jcs-171110
|View full text |Cite
|
Sign up to set email alerts
|

Systematic parsing of X.509: Eradicating security issues with a parse tree

Abstract: X.509 certificate parsing and validation is a critical task which has shown consistent lack of effectiveness, with practical attacks being reported with a steady rate during the last 10 years. In this work we analyze the X.509 standard and provide a grammar description of it amenable to the automated generation of a parser with strong termination guarantees, providing unambiguous input parsing. We report the results of analyzing a 11M X.509 certificate dump of the HTTPS servers running on the entire IPv4 space… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 19 publications
0
2
0
Order By: Relevance
“…Chen et al [7] introduced SBDT and discovered several bugs in certificate parsers by employing differential testing. Barenghi et al [3] showed that 21.5% of the X.509 certificates are syntactically incorrect and proposed a more secure approach for parsing X.509 certificates. Debnath et al [13] re-engineered the X.509 standard specification alleviating its design complexity, ambiguities, or under-specifications.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Chen et al [7] introduced SBDT and discovered several bugs in certificate parsers by employing differential testing. Barenghi et al [3] showed that 21.5% of the X.509 certificates are syntactically incorrect and proposed a more secure approach for parsing X.509 certificates. Debnath et al [13] re-engineered the X.509 standard specification alleviating its design complexity, ambiguities, or under-specifications.…”
Section: Related Workmentioning
confidence: 99%
“…Cloudflare Monitoring, DigiCert Monitoring, EZMonitor, Hardenize and Report-URI provide only the subscription services and CT-Observatory was suspended in September 2018 3. Some monitors also use other name fields such as organization (O) and organizational unit (OU) as keywords 4.…”
mentioning
confidence: 99%
“…Large body of prior research extends this line of work with the aim to improve the synthetic certificate generation process, including, but not limited to: Mucerts [20] that uses code coverage guidance, Coveringcerts [21] that uses combinatorial methods with theoretical guarantees, SymCerts [22] that adds symbolic execution, RFCcerts [23] that leverages certificate rules from protocol specification documents, Transcerts [24] that relies on coverage transfer graphs, NEZHA [25] that keeps track of behavioral asymmetries across multiple programs, and DRLgencert [26] that uses deep reinforcement learning to perform mutations on a certificate. Note that in contrast to these techniques that automatically generate synthetic certificates, Barenghi et al [27] work to first manually obtain a grammar for TLS certificates, and then build a parser to find legitimate issues in certificates that are missed by various implementations.…”
Section: Differential Testingmentioning
confidence: 99%