메뉴 건너뛰기




Volumn , Issue , 2014, Pages 114-129

Using frankencerts for automated adversarial testing of certificate validation in SSL/TLS implementations

Author keywords

automated testing; certificate validation; SSL

Indexed keywords

AUTOMATION; COMPUTER OPERATING SYSTEMS; DISTRIBUTED DATABASE SYSTEMS; EMBEDDED SYSTEMS; NETWORK PROTOCOLS;

EID: 84914109052     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2014.15     Document Type: Conference Paper
Times cited : (199)

References (79)
  • 1
    • 84890107028 scopus 로고    scopus 로고
    • Here's my cert, so trust me, maybe? Understanding TLS errors on the Web
    • D. Akhawe, B. Amann, M. Vallentin, and R. Sommer. Here's my cert, so trust me, maybe? Understanding TLS errors on the Web. In WWW, 2013.
    • (2013) WWW
    • Akhawe, D.1    Amann, B.2    Vallentin, M.3    Sommer, R.4
  • 2
    • 85002862540 scopus 로고    scopus 로고
    • Alice in warningland: A largescale field study of browser security warning effectiveness
    • D. Akhawe and A. Felt. Alice in Warningland: A largescale field study of browser security warning effectiveness. In USENIX Security, 2013.
    • (2013) USENIX Security
    • Akhawe, D.1    Felt, A.2
  • 3
    • 84881252956 scopus 로고    scopus 로고
    • Lucky thirteen: Breaking the TLS and DTLS record protocols
    • N. AlFardan and K. Paterson. Lucky thirteen: Breaking the TLS and DTLS record protocols. In S&P, 2013.
    • (2013) S&P
    • Alfardan, N.1    Paterson, K.2
  • 4
    • 84893210324 scopus 로고    scopus 로고
    • No attack necessary: The surprising dynamics of SSL trust relationships
    • B. Amann, R. Sommer, M. Vallentin, and S. Hall. No attack necessary: The surprising dynamics of SSL trust relationships. In ACSAC, 2013.
    • (2013) ACSAC
    • Amann, B.1    Sommer, R.2    Vallentin, M.3    Hall, S.4
  • 5
    • 84914111464 scopus 로고    scopus 로고
    • Vulnerable me: Measuring systemic weaknesses in mobile browser security
    • C. Amrutkar, K. Singh, A. Verma, and P. Traynor. Vulnerable Me: Measuring systemic weaknesses in mobile browser security. In ICISS, 2012.
    • (2012) ICISS
    • Amrutkar, C.1    Singh, K.2    Verma, A.3    Traynor, P.4
  • 8
    • 1842514147 scopus 로고    scopus 로고
    • Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1
    • D. Bleichenbacher. Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1. In CRYPTO, 1996.
    • (1996) CRYPTO
    • Bleichenbacher, D.1
  • 9
    • 85032541897 scopus 로고    scopus 로고
    • Remote timing attacks are practical
    • D. Brumley and D. Boneh. Remote timing attacks are practical. In USENIX Security, 2003.
    • (2003) USENIX Security
    • Brumley, D.1    Boneh, D.2
  • 10
    • 85077688456 scopus 로고    scopus 로고
    • Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation
    • D. Brumley, J. Caballero, Z. Liang, J. Newsome, and D. Song. Towards automatic discovery of deviations in binary implementations with applications to error detection and fingerprint generation. In USENIX Security, 2007.
    • (2007) USENIX Security
    • Brumley, D.1    Caballero, J.2    Liang, Z.3    Newsome, J.4    Song, D.5
  • 11
    • 67650790221 scopus 로고    scopus 로고
    • KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs
    • C. Cadar, D. Dunbar, and D. Engler. KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs. In OSDI, 2008.
    • (2008) OSDI
    • Cadar, C.1    Dunbar, D.2    Engler, D.3
  • 12
    • 33751059192 scopus 로고    scopus 로고
    • Execution generated test cases: How to make systems code crash itself
    • C. Cadar and D. Engler. Execution generated test cases: How to make systems code crash itself. In SPIN, 2005.
    • (2005) SPIN
    • Cadar, C.1    Engler, D.2
  • 13
    • 0036980185 scopus 로고    scopus 로고
    • Korat: Automated testing based on Java predicates
    • B. Chandrasekhar, S. Khurshid, and D. Marinov. Korat: Automated testing based on Java predicates. In ISSTA, 2002.
    • (2002) ISSTA
    • Chandrasekhar, B.1    Khurshid, S.2    Marinov, D.3
  • 15
    • 1542487771 scopus 로고    scopus 로고
    • A simple and practical approach to unit testing: The JML and JUnit way
    • Y. Cheon and G. Leavens. A simple and practical approach to unit testing: The JML and JUnit way. In ECOOP, 2002.
    • (2002) ECOOP
    • Cheon, Y.1    Leavens, G.2
  • 16
    • 84881218966 scopus 로고    scopus 로고
    • SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements
    • J. Clark and P. van Oorschot. SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements. In S&P, 2013.
    • (2013) S&P
    • Clark, J.1    Van Oorschot, P.2
  • 17
    • 84871954941 scopus 로고    scopus 로고
    • Comodo report of incident. http://www.comodo.com/Comodo-Fraud-Incident-2011-03-23.html, 2011.
    • (2011) Comodo Report of Incident
  • 18
  • 20
    • 0034997451 scopus 로고    scopus 로고
    • Finding failures by cluster analysis of execution profiles
    • W. Dickinson, D. Leon, and A. Podgurski. Finding failures by cluster analysis of execution profiles. In ICSE, 2001.
    • (2001) ICSE
    • Dickinson, W.1    Leon, D.2    Podgurski, A.3
  • 21
    • 84940397122 scopus 로고    scopus 로고
    • Origin-bound certificates: A fresh approach to strong client authentication for the Web
    • M. Dietz, A. Czeskis, D. Balfanz, and D. Wallach. Origin-bound certificates: A fresh approach to strong client authentication for the Web. In USENIX Security, 2012.
    • (2012) USENIX Security
    • Dietz, M.1    Czeskis, A.2    Balfanz, D.3    Wallach, D.4
  • 26
    • 85064040125 scopus 로고    scopus 로고
    • ZMap: Fast Internet-wide scanning and its security applications
    • Z. Durumeric, E. Wustrow, and A. Halderman. ZMap: Fast Internet-wide scanning and its security applications. In USENIX Security, 2013.
    • (2013) USENIX Security
    • Durumeric, Z.1    Wustrow, E.2    Halderman, A.3
  • 27
    • 80053025624 scopus 로고    scopus 로고
    • An observatory for the SSLiverse
    • P. Eckersley and J. Burns. An observatory for the SSLiverse. In DEFCON, 2010.
    • (2010) DEFCON
    • Eckersley, P.1    Burns, J.2
  • 28
    • 33750285595 scopus 로고    scopus 로고
    • Static and dynamic analysis: Synergy and duality
    • M. Ernst. Static and dynamic analysis: Synergy and duality. In WODA, 2003.
    • (2003) WODA
    • Ernst, M.1
  • 29
    • 84914179242 scopus 로고    scopus 로고
    • Why eve and mallory love android: An analysis of SSl (in)security on Android
    • S. Fahl, M. Harbach, T. Muders, and M. Smith. Why Eve and Mallory love Android: An analysis of SSl (in)security on Android. In CCS, 2012.
    • (2012) CCS
    • Fahl, S.1    Harbach, M.2    Muders, T.3    Smith, M.4
  • 31
    • 84869429339 scopus 로고    scopus 로고
    • The most dangerous code in the world: Validating SSL certificates in non-browser software
    • M. Georgiev, S. Iyengar, S. Jana, R. Anubhai, D. Boneh, and V. Shmatikov. The most dangerous code in the world: Validating SSL certificates in non-browser software. In CCS, 2012.
    • (2012) CCS
    • Georgiev, M.1    Iyengar, S.2    Jana, S.3    Anubhai, R.4    Boneh, D.5    Shmatikov, V.6
  • 33
    • 84914111456 scopus 로고    scopus 로고
    • CVE-2014-0092. https://bugzilla.redhat.com/show bug.cgi?id= 1069865, 2014.
    • (2014)
    • CVE-2014-00921
  • 35
    • 31844450371 scopus 로고    scopus 로고
    • DART: Directed automated random testing
    • P. Godefroid, N. Klarlund, and K. Sen. DART: Directed automated random testing. In PLDI, 2005.
    • (2005) PLDI
    • Godefroid, P.1    Klarlund, N.2    Sen, K.3
  • 37
    • 85008255060 scopus 로고    scopus 로고
    • Precise interface identification to improve testing and analysis of web applications
    • W. Halfond, S. Anand, and A. Orso. Precise interface identification to improve testing and analysis of web applications. In ISSTA, 2009.
    • (2009) ISSTA
    • Halfond, W.1    Anand, S.2    Orso, A.3
  • 38
    • 85076227028 scopus 로고    scopus 로고
    • Mining your Ps and Qs: Detection of widespread weak keys in network devices
    • N. Heninger, Z. Durumeric, E. Wustrow, and A. Halderman. Mining your Ps and Qs: Detection of widespread weak keys in network devices. In USENIX Security, 2012.
    • (2012) USENIX Security
    • Heninger, N.1    Durumeric, Z.2    Wustrow, E.3    Halderman, A.4
  • 40
    • 84914111455 scopus 로고    scopus 로고
    • CVE-2011-0228. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0228, 2011.
    • (2011)
    • CVE-2011-02281
  • 41
    • 77954695757 scopus 로고    scopus 로고
    • Reducing the costs of bounded-exhaustive testing
    • V. Jagannath, Y. Lee, B. Daniel, and D. Marinov. Reducing the costs of bounded-exhaustive testing. In FASE, 2009.
    • (2009) FASE
    • Jagannath, V.1    Lee, Y.2    Daniel, B.3    Marinov, D.4
  • 42
    • 84876950829 scopus 로고    scopus 로고
    • Abusing file processing in malware detectors for fun and profit
    • S. Jana and V. Shmatikov. Abusing file processing in malware detectors for fun and profit. In S&P, 2012.
    • (2012) S&P
    • Jana, S.1    Shmatikov, V.2
  • 44
    • 84869398182 scopus 로고    scopus 로고
    • PKI layer cake: New collision attacks against the global X.509 infrastructure
    • D. Kaminsky, M. Patterson, and L. Sassaman. PKI layer cake: New collision attacks against the global X.509 infrastructure. In FC, 2010.
    • (2010) FC
    • Kaminsky, D.1    Patterson, M.2    Sassaman, L.3
  • 45
    • 4544361507 scopus 로고    scopus 로고
    • Generalized symbolic execution for model checking and testing
    • S. Khurshid, C. Pasareanu, and W. Visser. Generalized symbolic execution for model checking and testing. In TACAS, 2003.
    • (2003) TACAS
    • Khurshid, S.1    Pasareanu, C.2    Visser, W.3
  • 46
    • 77949879017 scopus 로고    scopus 로고
    • Automatic creation of SQL injection and cross-site scripting attacks
    • A. Kiezun, P. Guo, K. Jayaraman, and M. Ernst. Automatic creation of SQL injection and cross-site scripting attacks. In ICSE, 2009.
    • (2009) ICSE
    • Kiezun, A.1    Guo, P.2    Jayaraman, K.3    Ernst, M.4
  • 47
    • 0016971687 scopus 로고
    • Symbolic execution and program testing
    • J. King. Symbolic execution and program testing. Commun. ACM, 19(7), 1976.
    • (1976) Commun. ACM , vol.19 , Issue.7
    • King, J.1
  • 48
    • 33745875641 scopus 로고    scopus 로고
    • Controllable combinatorial coverage in grammar-based testing
    • Lecture Notes in Computer Science
    • R. Lammel and W. Schulte. Controllable combinatorial coverage in grammar-based testing. In Testing of Communicating Systems, Lecture Notes in Computer Science, pages 19-38. 2006.
    • (2006) Testing of Communicating Systems , pp. 19-38
    • Lammel, R.1    Schulte, W.2
  • 51
    • 58049169957 scopus 로고    scopus 로고
    • Directed test generation using symbolic grammars
    • R. Majumdar and R. Xu. Directed test generation using symbolic grammars. In ASE, 2007.
    • (2007) ASE
    • Majumdar, R.1    Xu, R.2
  • 52
    • 37849023827 scopus 로고    scopus 로고
    • An interpretation of Purdom's algorithm for automatic generation of test cases
    • B. Malloy and J. Power. An interpretation of Purdom's algorithm for automatic generation of test cases. In ICIS, 2001.
    • (2001) ICIS
    • Malloy, B.1    Power, J.2
  • 53
    • 67650736074 scopus 로고    scopus 로고
    • Test era: A novel framework for automated testing of Java programs
    • D. Marinov and S. Khurshid. Test Era: A novel framework for automated testing of Java programs. In ASE, 2001.
    • (2001) ASE
    • Marinov, D.1    Khurshid, S.2
  • 58
    • 0025452154 scopus 로고
    • Generating test data with enhanced context-free grammars
    • P. Maurer. Generating test data with enhanced context-free grammars. IEEE Software, 7(4):50-55, 1990.
    • (1990) IEEE Software , vol.7 , Issue.4 , pp. 50-55
    • Maurer, P.1
  • 59
    • 4043152821 scopus 로고    scopus 로고
    • Differential testing for software
    • W. McKeeman. Differential testing for software. Digital Technical Journal, 10(1):100-107, 1998.
    • (1998) Digital Technical Journal , vol.10 , Issue.1 , pp. 100-107
    • McKeeman, W.1
  • 60
    • 84910676171 scopus 로고    scopus 로고
    • Practical issues with TLS client certificate authentication
    • A. Parsovs. Practical issues with TLS client certificate authentication. In NDSS, 2014.
    • (2014) NDSS
    • Parsovs, A.1
  • 62
    • 33745173348 scopus 로고
    • A sentence generator for testing parsers
    • P. Purdom. A sentence generator for testing parsers. BIT Numerical Mathematics, 12:366-375, 1972.
    • (1972) BIT Numerical Mathematics , vol.12 , pp. 366-375
    • Purdom, P.1
  • 63
    • 84883736511 scopus 로고    scopus 로고
    • Practical, low-effort equivalence verification of real code
    • D. Ramos and D. Engler. Practical, low-effort equivalence verification of real code. In CAV, 2011.
    • (2011) CAV
    • Ramos, D.1    Engler, D.2
  • 64
    • 0003956839 scopus 로고    scopus 로고
    • version 1.0
    • The TLS protocol version 1.0. http://tools.ietf.org/html/rfc2246, 1999.
    • (1999) The TLS Protocol
  • 66
    • 2942597551 scopus 로고    scopus 로고
    • HTTP over TLS. http://www.ietf.org/rfc/rfc2818.txt, 2000.
    • (2000) HTTP over TLS
  • 74
    • 32344447459 scopus 로고    scopus 로고
    • CUTE: A concolic unit testing engine for C
    • K. Sen, D. Marinov, and G. Agha. CUTE: A concolic unit testing engine for C. In FSE, 2005.
    • (2005) FSE
    • Sen, K.1    Marinov, D.2    Agha, G.3
  • 76
    • 79959910753 scopus 로고    scopus 로고
    • A security policy oracle: Detecting security holes using multiple API implementations
    • V. Srivastava, M. Bond, K. McKinley, and V. Shmatikov. A security policy oracle: Detecting security holes using multiple API implementations. In PLDI, 2011.
    • (2011) PLDI
    • Srivastava, V.1    Bond, M.2    McKinley, K.3    Shmatikov, V.4
  • 79
    • 79959889388 scopus 로고    scopus 로고
    • Finding and understanding bugs in C compilers
    • X. Yang, Y. Chen, E. Eide, and J. Regehr. Finding and understanding bugs in C compilers. In PLDI, 2011.
    • (2011) PLDI
    • Yang, X.1    Chen, Y.2    Eide, E.3    Regehr, J.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.