Skip to main content

Linguistic Security Testing for Text Communication Protocols

  • Conference paper
Testing – Practice and Research Techniques (TAIC PART 2010)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 6303))

Abstract

We introduce a new Syntax-based Security Testing (SST) framework that uses a protocol specification to perform security testing on text-based communication protocols. A protocol specification of a particular text-based protocol under-tested represents its syntactic grammar and static constraints. The specification is used to generate test cases by mutating valid messages, breaking the syntactic and constraints of the protocol. The framework is demonstrated using a toy Web application and the open source application KOrganizer.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. AboElFotoh, M., Dean, T.R., Mayor, R.: An Empirical Study of a Language Based Security Testing Technique. In: Proc. 19th IBM Centres for Advanced Studies Conference, Toronto, Canada, pp. 112–121 (November 2009)

    Google Scholar 

  2. Aitel, D.: The Advantages of Block-Based Protocol Analysis for Security Testing, http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.116.1178&rep=rep1&type=pdf (Last accessed, 2010)

  3. Beizer, B.: Software testing techniques. Van Nostrand Reinhold Company, New York (1990) ISBN: 0-442-24592-0

    Google Scholar 

  4. Borenstein, N., Freed, N.: MIME Part One: Format of Internet Message Bodies. Internet RFC 2045 (1996)

    Google Scholar 

  5. Bray, T., Paoli, J., Sperberg-McQueen, C.M., Maler, E., Yergeau, F.: Extensible Markup Language (XML) 1.0 (Fifth Edition). W3C (2008)

    Google Scholar 

  6. Cordy, J.R.: The TXL Source Transformation Language. Science of Computer Programming 61(3), 190–210 (2006)

    Article  MATH  MathSciNet  Google Scholar 

  7. Dawson, F., Stenerson, D.: Internet Calendaring and Scheduling Core Object Specification (iCalendar). Lotus, Microsoft, IETF RFC 2445 (1998)

    Google Scholar 

  8. Dean, T.R., Cordy, J.R., Malton, A.J., Schneider, K.A.: Agile Parsing in TXL. Journal of Automated Software Engineering, 311–336 (2003)

    Google Scholar 

  9. Fielding, R., Irvine, U.C., Gettys, J., Mogul, J., Frystyk, H., Masinter, L., Leach, P., Berners-Lee, T.: Hypertext Transfer Protocol - HTTP/1.1. Compaq/W3C, Compaq, W3C/MIT, Xerox, Microsoft, W3C/MIT, IETF RFC 2616 (1999)

    Google Scholar 

  10. Gudgin, M., Hadley, M., Mendelsohn, N., Moreau, J., Frystyk, H., Karmarkar, A., Lafon, Y.: SOAP Version 1.2 Part 1: Messaging Framework (Second Edition). W3C Recommendation (2007)

    Google Scholar 

  11. Halfond, W.G.J., Orso, A.: AMNESIA: Analysis and Monitoring for NEutralizing SQL-Injection Attacks. In: Proceedings of the 20th IEEE/ACM International Conference on Automated Software engineering (ASE 2005), pp. 174–183 (2005)

    Google Scholar 

  12. Halfond, W.G.J., Orso, A.: Combining static analysis and runtime monitoring to counter SQL-injection attacks. In: Proceedings of the 3rd International ICSE Workshop on Dynamic Analysis (WODA), pp. 105–110. IEEE Computer Society Press, Los Alamitos (2005)

    Google Scholar 

  13. Jing, C., Wang, Z., Shi, X., Yin, X., Wu, J.: Mutation Testing of Protocol Messages Based on Extended TTCN-3. In: Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, pp. 667–674 (2008)

    Google Scholar 

  14. Jurjens, J., Wimmel, G.: Formally Testing Fail-safety of Electronic Purse Protocols. In: Automated Software Engineering, pp. 408–411. IEEE Computer Society, Los Alamitos (2001)

    Google Scholar 

  15. Martin, E., Xie, T.: A fault model and mutation testing of access control policies. In: Proceedings of the 16th International Conference on World Wide Web (WWW 2007), Security, Privacy, Reliability, and Ethics Track, Banff, Alberta, Canada, pp. 667–676 (May 2007)

    Google Scholar 

  16. Martin, E., Xie, T., Yu, T.: Defining and measuring policy coverage in testing access control policies. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 139–158. Springer, Heidelberg (2006)

    Chapter  Google Scholar 

  17. Merlo, E., Letarte, D., Antoniol, G.: Automated Protection of PHP Applications Against SQL-injection Attacks. In: Proceedings of the 11th European Conference on Software Maintenance and Reengineering, pp. 191–202 (2007)

    Google Scholar 

  18. Mouelhi, T., Le Traon, Y., Baudry, B.: Mutation analysis for security test qualification. In: Proceedings of the Testing: Academic and Industrial Conference Practice and Research Techniques, pp. 233–242 (2007)

    Google Scholar 

  19. Moy, J.: OSPF Version 2. Internet RFC 2328 (1998)

    Google Scholar 

  20. OWASP: The Open Web Application Security Project, http://www.owasp.org/ (Last accessed: 2009)

  21. Tal, O., Knight, S., Dean, T.R.: Syntax-based Vulnerabilities Testing of Frame-based Network Protocols. In: Proceedings of the Second Annual Conference on Privacy, Security and Trust (2004)

    Google Scholar 

  22. Turcotte, Y., Oded, T., Knight, S., Dean, T.R.: Security Vulnerabilities Assessment of the X.509 Protocol by Syntax-Based Testing. In: Proceedings of MILCOM 2004 on Military Communications Conference, pp. 1572–1578 (2004)

    Google Scholar 

  23. WASC Projects. Web Application Security Consortium, Threat Classification, http://projects.webappsec.org/Threat-Classification (Last accessed 2008)

  24. Wimmel, G., Jurjens, J.: Specification-based Test Generation for Security-Critical Systems Using Mutations. In: George, C.W., Miao, H. (eds.) ICFEM 2002. LNCS, vol. 2495, pp. 471–482. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  25. Xmacro, http://xmacro.sourceforge.net/ (Last accessed April 29, 2010)

  26. Zhang, S., Dean, T.R., Knight, G.S.: Lightweight State Based Mutation Testing for Security. In: Proc. TAICPART-MUTATION 2007, Windsor, UK, pp. 223–232 (2007)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kam, B.W.Y., Dean, T.R. (2010). Linguistic Security Testing for Text Communication Protocols. In: Bottaci, L., Fraser, G. (eds) Testing – Practice and Research Techniques. TAIC PART 2010. Lecture Notes in Computer Science, vol 6303. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15585-7_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-15585-7_10

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-15584-0

  • Online ISBN: 978-3-642-15585-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics