2019
DOI: 10.1007/978-981-13-5826-5_27
|View full text |Cite
|
Sign up to set email alerts
|

Identification of Bugs and Vulnerabilities in TLS Implementation for Windows Operating System Using State Machine Learning

Abstract: TLS protocol is an essential part of secure Internet communication. In past, many attacks have been identified on the protocol. Most of these attacks are due to flaws in protocol implementation. The flaws are due to improper design and implementation of program logic by programmers. One of the widely used implementation of TLS is SChannel which is used in Windows operating system since its inception. We have used "protocol state fuzzing" to identify vulnerable and undesired state transitions in the state machi… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 4 publications
0
4
0
Order By: Relevance
“…de Ruiter and Poll [2015] report that łnew security flaws were found (in GnuTLS, the Java Secure Socket Extension, and OpenSSL)ž using protocol state fuzzing. This kind of issue can be discovered even without access to the source code, as demonstrated on Windows SChannel [Yadav and Sadhukhan 2019].…”
Section: Tls State Machinesmentioning
confidence: 99%
See 1 more Smart Citation
“…de Ruiter and Poll [2015] report that łnew security flaws were found (in GnuTLS, the Java Secure Socket Extension, and OpenSSL)ž using protocol state fuzzing. This kind of issue can be discovered even without access to the source code, as demonstrated on Windows SChannel [Yadav and Sadhukhan 2019].…”
Section: Tls State Machinesmentioning
confidence: 99%
“…Many popular implementations of security-critical network protocols such as TLS are prone to łstate-machine vulnerabilitiesž [Beurdouche et al 2015;de Ruiter and Poll 2015;Yadav and Sadhukhan 2019] that occur due to human error in translating the desired interaction flow into a state type and state-transition function. This section will review the key programming task during which these errors occur and lead to our proposed alternative: a compiler that translates code with I/O operations into a self-contained state type and a step function that accepts inputs and returns outputs.…”
Section: Introductionmentioning
confidence: 99%
“…For standardized verification of the protocol implementation [2,3], Chaki et al [4] combined software model detection with standard protocol security models to automatically analyze the authentication and confidentiality of the protocol in the C language. For the protocol state machine [5,6], Ruiter et al [7] modeled a state machine for implementing the TLS protocol based on the active learning method. They also manually analyzed the generated state machine to find logical vulnerabilities.…”
Section: Introductionmentioning
confidence: 99%
“…Computer security isn't quite new, but it has reawakened attention in recent years as a result of the failure of networkbased security measures such as firewalls. Unfortunately, today's software has design bugs as well as implementation defects, posing an intolerable security risk [7]. Any application, no matter how harmless it appears, might include security flaws.…”
Section: Introductionmentioning
confidence: 99%