skip to main content
10.1145/1188966.1188993dlproceedingsArticle/Chapter ViewAbstractPublication PagescasconConference Proceedingsconference-collections
Article

Packet decoding using context sensitive parsing

Published: 16 October 2006 Publication History

Abstract

Protocol tester is a project at RMC and Queen's that applies program transformation techniques to protocol data to evaluate the security of network applications. As part of this process, binary protocols are translated into a textual representation. This paper describes a translation process using a context sensitive parser that eliminates the need to write custom code to decode each individual protocol. It is a template driven top down parser augmented by a constraint engine. The constraint engine is used to implement the context sensitive restrictions.

References

[1]
A. Aho, S. Johnson, "LR Parsing", Computing Surveys of the ACM, Vol 6, No. 2, June 1974, pp 99--124.]]
[2]
Apple Computer, Inc. Apple Filing Protocol Programming Guide Version 3.2]]
[3]
M. Baker, N. Nottingham, "The application /soap +xml media type, RFC 3902, Sept. 2004, http://www.faqs.org/rfcs/frc3902.html.]]
[4]
Beizer, B. Software Testing Techniques, New York, Van Nostrand Reinhold, 1983.]]
[5]
Beizer, B. "Software Testing Techniques, Second Edition", New York, Van Nostrand Reinhold, 1990.]]
[6]
F. Bolton, Pure Corba, 1st ed., Sams Publishing, July, 2001, ISBN 0672318121.]]
[7]
Case, J., Fedor, M., Schoffstall, M., Davin, J. "A Simple Network Management Protocol", IETF 1990. http://www.faqs.org/rfcs/rfc 1157.html]]
[8]
Case, J., Mundy, R., Partain, D., Stewart, B., "Introduction and Applicability Statements for Internet Standard Management Framework", RFC 3410, December 2002.]]
[9]
J. R. Cordy, "TXL - A Language for Programming Language Tools and Applications", Proc. LDTA 2004, ACM 4th International Workshop on Language Descriptions, Tools and Applications, Edinburg, Scotland, January 2005, pp. 3--31.]]
[10]
Dubuisson, O. "ASN.1 Communications Between Heterogeneous Systems". Morgan Kaufmann San Francisco, USA 2001.]]
[11]
R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach, T. Berners-Lee, "Hyptertext Transfer Protocol -- HTTP/1.1", RFC 2616, June 1999. http://www.faqs.org/rfcs/rfc2616.html]]
[12]
M. Ganapathi, Retargetable code generation and optimization using attribute grammars, Doctoral Thesis, University of Wisconson-Madison, January 1980.]]
[13]
M. Griffiths, "LL(1) Grammars and Analyses", Lecture Notes in Computer Science - Compiler Construction, No 21, Springer Verlag, New York, 1974, pp 57--84.]]
[14]
M. Henning, S. Vinoski, Advanced CORBA(R) Programming with C++, 1st ed., Addison-Wesley Professional, February, 1999, ISBN 0201379279]]
[15]
International Standard 8824 - INTERNATIONAL TELECOMMUNICATION UNION X.208, "Information technology - Open Systems Interconnection -- Specification of Abstract Syntax Notation One (ASN. 1)", 1988.]]
[16]
International Standard 8825-1 - INTERNATIONAL TELECOMMUNICATION UNION X.690, "Information Technology - ASN.1 Encoding Rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)", http://www.itu.int/ITUT/stu - dygroups/com17/languages/X690_0702.pdf, 2002.]]
[17]
R. Kaksonen, A Functional Method for Assessing Protocol Implementation Security, Licentiate Thesis. Espoo. Technical Research Centre of Finland, VTT Publications 447. ISBN 951-38-5873-1]]
[18]
R. Kaksonen, M. Laakso, A. Takanen, "Software Security Assessment through Specification Mutations and Fault Injection". Proc. of Communications and Multimedia Security Issues of the New Century / IFIP TC6/TC11 Fifth Joint Working Conference on Communications and Multimedia Security (CMS'01), Darmstadt, Germany, May 2001, ISDN 0-7923-7365-0.]]
[19]
U. Lamping, R. Sharpe, E. Warnik, Ethereal User's Guide, 18189 for Ethereal 0.10. 14, 2005, http://www.ethereal.com/, accessed August 10, 2006.]]
[20]
U. Lamping, Ethereal Developer's Guide, 18189 for Ethereal 0.10.14, 2005, http://www.ethereal.com/, accessed August 10,2006.]]
[21]
Leach, P., Naik, D., Draft-leach-cifs-vlspec-02: A Common Internet File System (CIFS/1.0) Protocol, Expired Internet Draft. IETF, March 13, 1997, http://www.ubiqx.org/cifs/rfc-draft/draft-leach-cifs-v1-spec-02.html]]
[22]
Lougheed, K. Rekhter, Y. "A Border Gateway Protocol 4" (BGP-4), IETF 1995, ftp://ftp.rfc-editor.org/in-notes/rfc 1771.txt]]
[23]
Marquis, S, Dean T., Knight, G. S. N, SCL: A Language for Security Testing of Network Applications, Proc. CASCON 2005, Toronto, Oct. 2005.]]
[24]
B. J. McKenzie, LR Parsing of CFG's wixh Restrictions, Tech Report 8903, Department of Computer Science, University of Canterbury, Christchurch, New Zealand.]]
[25]
Moy, J., "OSPF version 2", IETF June 1998, ftp://ftp.rfc-editor.org/innotes/rfc2328.txt]]
[26]
SNORT web site at http://www.snort.org, accessed August 10, 2006.]]
[27]
Sun, "The Java 2 API specification, version 1.5", Sun Microsystems, Sata Clara, USA 2004.]]
[28]
O. Tal, T. R. Dean, G. S. Knight, Y. Turcotte, "Syntax-based Vulnerability Testing of Frame-based Network Protocols", Proceedings of the Second Annual Conference on Privacy, Security, and Trust, Fredericton, Canada 2004, pp. 155--161]]
[29]
A. D. Thurston and J. R. Cordy. "A Backtracking LR Algorithm for Parsing Ambiguous Context-Dependent Languages" In 2006 Conference of the Centre for Advanced Studies on Collaborative Research (CASCON 2006). 14 pp., Toronto, October 2006 (to appear).]]
[30]
M. Tomita, editor. Generalized LR parsing. Kluwer, Norwell, MA, 1991]]
[31]
H. H. Vogt, S. D. Swierstra M. F. Kuiper "Higher order attribute grammars", Proceedings of the ACM SIGPLAN 1989 Conference on Programming language design and implementation, Portland, Oregon, 1989, pp: 131--145]]

Cited By

View all
  • (2016)Intrusion detection in a private network by satisfying constraints2016 14th Annual Conference on Privacy, Security and Trust (PST)10.1109/PST.2016.7906997(623-628)Online publication date: Dec-2016

Index Terms

  1. Packet decoding using context sensitive parsing

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image DL Hosted proceedings
    CASCON '06: Proceedings of the 2006 conference of the Center for Advanced Studies on Collaborative research
    October 2006
    388 pages

    Sponsors

    • IBM Toronto Lab
    • CAS

    Publisher

    IBM Corp.

    United States

    Publication History

    Published: 16 October 2006

    Qualifiers

    • Article

    Acceptance Rates

    CASCON '06 Paper Acceptance Rate 24 of 90 submissions, 27%;
    Overall Acceptance Rate 24 of 90 submissions, 27%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 05 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2016)Intrusion detection in a private network by satisfying constraints2016 14th Annual Conference on Privacy, Security and Trust (PST)10.1109/PST.2016.7906997(623-628)Online publication date: Dec-2016

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media