2013
DOI: 10.1007/978-3-642-39799-8_51
|View full text |Cite
|
Sign up to set email alerts
|

Finding Security Vulnerabilities in a Network Protocol Using Parameterized Systems

Abstract: This paper presents a novel approach to automatically finding security vulnerabilities in the routing protocol OSPF-the most widely used protocol for Internet routing. We start by modeling OSPF on (concrete) networks with a fixed number of routers in a specific topology. By using the model checking tool CBMC, we found several simple, previously unpublished attacks on OSPF. In order to search for attacks in a family of networks with varied sizes and topologies, we define the concept of an abstract network which… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
7
1
1

Relationship

2
7

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 11 publications
0
5
0
Order By: Relevance
“…These parts include the LSA flooding procedure, the fight-back mechanism, the LSA message structure, and the LSA purge procedure. We leverage and extend an OSPF model that was proposed by [34] and [27]. The model was previously used in the context of model checking to find vulnerabilities in the protocol's standard itself.…”
Section: The Ospf Symbolic Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…These parts include the LSA flooding procedure, the fight-back mechanism, the LSA message structure, and the LSA purge procedure. We leverage and extend an OSPF model that was proposed by [34] and [27]. The model was previously used in the context of model checking to find vulnerabilities in the protocol's standard itself.…”
Section: The Ospf Symbolic Modelmentioning
confidence: 99%
“…Several works have analyzed the OSPF standard itself for security vulnerabilities [27,34,23]. A few of these works have used the same threat model and even the same formal model of the OSPF standard, as we did here.…”
Section: Ospf Analysismentioning
confidence: 99%
“…Here the behavior of a system is specified as a transition relation between finite state and a checker can verify that all reachable states from a starting configuration are safe (i.e., do not cause any invariant violation). Tools such as NICE [7], HSA [20] and others [39] rely on this technique. However these techniques scale exponentially with the number of states and for even moderately large problems one must choose between being able to verify in reasonable time and completeness.…”
Section: Related Workmentioning
confidence: 99%
“…Here the behavior of a system is specified as a transition relation between finite state and a checker can verify that all reachable states from a starting configuration are safe (i.e., do not cause any invariant violation). Tools such as NICE [4], HSA [19] and others [35] rely on this technique. However these techniques scale exponentially with the number of states and for even moderately large problems one must chose between being able to verify in reasonable time and completeness.…”
Section: Related Workmentioning
confidence: 99%