Abstract
We introduce a new Syntax-based Security Testing (SST) framework that uses a protocol specification to perform security testing on text-based communication protocols. A protocol specification of a particular text-based protocol under-tested represents its syntactic grammar and static constraints. The specification is used to generate test cases by mutating valid messages, breaking the syntactic and constraints of the protocol. The framework is demonstrated using a toy Web application and the open source application KOrganizer.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
AboElFotoh, M., Dean, T.R., Mayor, R.: An Empirical Study of a Language Based Security Testing Technique. In: Proc. 19th IBM Centres for Advanced Studies Conference, Toronto, Canada, pp. 112–121 (November 2009)
Aitel, D.: The Advantages of Block-Based Protocol Analysis for Security Testing, http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.116.1178&rep=rep1&type=pdf (Last accessed, 2010)
Beizer, B.: Software testing techniques. Van Nostrand Reinhold Company, New York (1990) ISBN: 0-442-24592-0
Borenstein, N., Freed, N.: MIME Part One: Format of Internet Message Bodies. Internet RFC 2045 (1996)
Bray, T., Paoli, J., Sperberg-McQueen, C.M., Maler, E., Yergeau, F.: Extensible Markup Language (XML) 1.0 (Fifth Edition). W3C (2008)
Cordy, J.R.: The TXL Source Transformation Language. Science of Computer Programming 61(3), 190–210 (2006)
Dawson, F., Stenerson, D.: Internet Calendaring and Scheduling Core Object Specification (iCalendar). Lotus, Microsoft, IETF RFC 2445 (1998)
Dean, T.R., Cordy, J.R., Malton, A.J., Schneider, K.A.: Agile Parsing in TXL. Journal of Automated Software Engineering, 311–336 (2003)
Fielding, R., Irvine, U.C., Gettys, J., Mogul, J., Frystyk, H., Masinter, L., Leach, P., Berners-Lee, T.: Hypertext Transfer Protocol - HTTP/1.1. Compaq/W3C, Compaq, W3C/MIT, Xerox, Microsoft, W3C/MIT, IETF RFC 2616 (1999)
Gudgin, M., Hadley, M., Mendelsohn, N., Moreau, J., Frystyk, H., Karmarkar, A., Lafon, Y.: SOAP Version 1.2 Part 1: Messaging Framework (Second Edition). W3C Recommendation (2007)
Halfond, W.G.J., Orso, A.: AMNESIA: Analysis and Monitoring for NEutralizing SQL-Injection Attacks. In: Proceedings of the 20th IEEE/ACM International Conference on Automated Software engineering (ASE 2005), pp. 174–183 (2005)
Halfond, W.G.J., Orso, A.: Combining static analysis and runtime monitoring to counter SQL-injection attacks. In: Proceedings of the 3rd International ICSE Workshop on Dynamic Analysis (WODA), pp. 105–110. IEEE Computer Society Press, Los Alamitos (2005)
Jing, C., Wang, Z., Shi, X., Yin, X., Wu, J.: Mutation Testing of Protocol Messages Based on Extended TTCN-3. In: Proceedings of the 22nd International Conference on Advanced Information Networking and Applications, pp. 667–674 (2008)
Jurjens, J., Wimmel, G.: Formally Testing Fail-safety of Electronic Purse Protocols. In: Automated Software Engineering, pp. 408–411. IEEE Computer Society, Los Alamitos (2001)
Martin, E., Xie, T.: A fault model and mutation testing of access control policies. In: Proceedings of the 16th International Conference on World Wide Web (WWW 2007), Security, Privacy, Reliability, and Ethics Track, Banff, Alberta, Canada, pp. 667–676 (May 2007)
Martin, E., Xie, T., Yu, T.: Defining and measuring policy coverage in testing access control policies. In: Ning, P., Qing, S., Li, N. (eds.) ICICS 2006. LNCS, vol. 4307, pp. 139–158. Springer, Heidelberg (2006)
Merlo, E., Letarte, D., Antoniol, G.: Automated Protection of PHP Applications Against SQL-injection Attacks. In: Proceedings of the 11th European Conference on Software Maintenance and Reengineering, pp. 191–202 (2007)
Mouelhi, T., Le Traon, Y., Baudry, B.: Mutation analysis for security test qualification. In: Proceedings of the Testing: Academic and Industrial Conference Practice and Research Techniques, pp. 233–242 (2007)
Moy, J.: OSPF Version 2. Internet RFC 2328 (1998)
OWASP: The Open Web Application Security Project, http://www.owasp.org/ (Last accessed: 2009)
Tal, O., Knight, S., Dean, T.R.: Syntax-based Vulnerabilities Testing of Frame-based Network Protocols. In: Proceedings of the Second Annual Conference on Privacy, Security and Trust (2004)
Turcotte, Y., Oded, T., Knight, S., Dean, T.R.: Security Vulnerabilities Assessment of the X.509 Protocol by Syntax-Based Testing. In: Proceedings of MILCOM 2004 on Military Communications Conference, pp. 1572–1578 (2004)
WASC Projects. Web Application Security Consortium, Threat Classification, http://projects.webappsec.org/Threat-Classification (Last accessed 2008)
Wimmel, G., Jurjens, J.: Specification-based Test Generation for Security-Critical Systems Using Mutations. In: George, C.W., Miao, H. (eds.) ICFEM 2002. LNCS, vol. 2495, pp. 471–482. Springer, Heidelberg (2002)
Xmacro, http://xmacro.sourceforge.net/ (Last accessed April 29, 2010)
Zhang, S., Dean, T.R., Knight, G.S.: Lightweight State Based Mutation Testing for Security. In: Proc. TAICPART-MUTATION 2007, Windsor, UK, pp. 223–232 (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kam, B.W.Y., Dean, T.R. (2010). Linguistic Security Testing for Text Communication Protocols. In: Bottaci, L., Fraser, G. (eds) Testing – Practice and Research Techniques. TAIC PART 2010. Lecture Notes in Computer Science, vol 6303. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15585-7_10
Download citation
DOI: https://doi.org/10.1007/978-3-642-15585-7_10
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-15584-0
Online ISBN: 978-3-642-15585-7
eBook Packages: Computer ScienceComputer Science (R0)