Identification of Bugs and Vulnerabilities in TLS Implementation for Windows Operating System Using State Machine Learning

02/20/2019
by   Tarun Yadav, et al.
0

TLS protocol is an essential part of secure Internet communication. In past, many attacks have been identified on the protocol. Most of these attacks are due to flaws in protocol implementation. The flaws are due to improper design and implementation of program logic by programmers. One of the widely used implementation of TLS is SChannel which is used in Windows operating system since its inception. We have used protocol state fuzzing to identify vulnerable and undesired state transitions in the state machine of the protocol for various versions of SChannel. The client as well as server components have been analyzed thoroughly using this technique and various flaws have been discovered in the implementation. Exploitation of these flaws under specific circumstances may lead to serious attacks which could disrupt secure communication. In this paper, we analyze state machine models of TLS protocol implementation of SChannel library and describe weaknesses and design flaws in these models, found using protocol state fuzzing.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/11/2019

State machine inference of QUIC

QUIC is a recent transport protocol that provides reliable, secure and q...
research
11/25/2017

Modular Remote Communication Protocol Interpreters

We present "endpoints", a library that provides consistent client implem...
research
11/23/2021

Towards an Integrated Penetration Testing Environment for the CAN Protocol

The Controller Area Network (CAN) is the most common protocol interconne...
research
03/07/2022

Towards Flexible Anonymous Networks

Anonymous Communication designs such as Tor build their security upon di...
research
11/12/2020

Machine Learning Interpretability Meets TLS Fingerprinting

Protecting users' privacy over the Internet is of great importance. Howe...
research
02/27/2022

Split HE: Fast Secure Inference Combining Split Learning and Homomorphic Encryption

This work presents a novel protocol for fast secure inference of neural ...
research
05/12/2017

TraX: The visual Tracking eXchange Protocol and Library

In this paper we address the problem of developing on-line visual tracki...

Please sign up or login with your details

Forgot password? Click here to reset