Volltext-Downloads (blau) und Frontdoor-Views (grau)
The search result changed since you submitted your search request. Documents might be displayed in a different sort order.
  • search hit 4 of 22
Back to Result List

Exploiting Dissent: Towards Fuzzing-based Differential Black Box Testing of TLS Implementations

  • The Transport Layer Security (TLS) protocol is one of the most widely used security protocols on the internet. Yet do implementations of TLS keep on suffering from bugs and security vulnerabilities. In large part is this due to the protocol's complexity which makes implementing and testing TLS notoriously difficult. In this paper, we present our work on using differential testing as effectiveThe Transport Layer Security (TLS) protocol is one of the most widely used security protocols on the internet. Yet do implementations of TLS keep on suffering from bugs and security vulnerabilities. In large part is this due to the protocol's complexity which makes implementing and testing TLS notoriously difficult. In this paper, we present our work on using differential testing as effective means to detect issues in black-box implementations of the TLS handshake protocol. We introduce a novel fuzzing algorithm for generating large and diverse corpuses of mostly-valid TLS handshake messages. Stimulating TLS servers when expecting a ClientHello message, we find messages generated with our algorithm to induce more response discrepancies and to achieve a higher code coverage than those generated with American Fuzzy Lop, TLS-Attacker, or NEZHA. In particular, we apply our approach to OpenssL, BoringSSL, WolfSSL, mbedTLS, and MatrixSSL, and find several real implementation bugs; among them a serious vulnerability in MatrixSSL 3.8.4. Besides do our findings point to imprecision in the TLS specification. We see our approach as present in this paper as the first step towards fully interactive differential testing of black-box TLS protocol implementations. Our software tools are publicly available as open source projects.show moreshow less

Export metadata

Additional Services

Search Google Scholar

Statistics

frontdoor_oas
Metadaten
Document Type:Article (reviewed)
Zitierlink: https://opus.hs-offenburg.de/3618
Bibliografische Angaben
Title (English):Exploiting Dissent: Towards Fuzzing-based Differential Black Box Testing of TLS Implementations
Author:Andreas WalzStaff MemberORCiD, Axel SikoraStaff MemberORCiDGND
Year of Publication:2017
Creating Corporation:IEEE
First Page:278
Last Page:291
Parent Title (English):IEEE Transactions on Dependable and Secure Computing
Volume:17
Issue:2
ISSN:1545-5971 (Print)
ISSN:1941-0018 (digital)
ISSN:2160-9209 (CD-ROM)
DOI:https://doi.org/10.1109/TDSC.2017.2763947
Language:English
Inhaltliche Informationen
Institutes:Forschung / ivESK - Institut für verlässliche Embedded Systems und Kommunikationselektronik
Fakultät Elektrotechnik und Informationstechnik (E+I) (bis 03/2019)
Institutes:Bibliografie
GND Keyword:Dissens; Flugdatenregistriergerät; Terrestrisches Laserscanning
Formale Angaben
Open Access: Closed Access 
Licence (German):License LogoUrheberrechtlich geschützt