Systems Engineering and Electronics ›› 2021, Vol. 43 ›› Issue (3): 839-846.doi: 10.12305/j.issn.1001-506X.2021.03.30

• Communications and Networks • Previous Articles     Next Articles

Security analysis of TLS protocol implementations based on model checking

Xing BI1(), Chaojing TANG2()   

  1. 1. College of Advanced Interdisciplinary Studies, National University of Defense Technology, Changsha 410073, China
    2. College of Electronic Science and Technology, National University of Defense Technology, Changsha 410073, China
  • Received:2020-03-18 Online:2021-03-01 Published:2021-03-16

Abstract:

In view of the problem that the traditional fuzzy testing method can find the memory vulnerability of the transport layer security (TLS) protocol implementation, but it can not find the logic loophole, based on the method of model detection, the state machine model of TLS protocol implementation is extracted, establishes the protocol security attribute model is establised, the possible abnormal behavior in the protocol implementation is looked, and the automation and system analysis of the protocol implementation is realized. The security attribute of the state machine for the protocol implementation generated by test cases is modeled, and the extracted model is checked by using the NuSMV tool. The experiment results show that the proposed method can effectively analyze the state machine model of TLS protocol implementation, and find the logic loopholes and the defects inconsistent with the specification.

Key words: security protocol analysis, transport layer security (TLS), finite state machine, model checking

CLC Number: 

[an error occurred while processing this directive]