Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1188966.1188993dlproceedingsArticle/Chapter ViewAbstractPublication PagescasconConference Proceedingsconference-collections
Article

Packet decoding using context sensitive parsing

Published: 16 October 2006 Publication History
  • Get Citation Alerts
  • Abstract

    Protocol tester is a project at RMC and Queen's that applies program transformation techniques to protocol data to evaluate the security of network applications. As part of this process, binary protocols are translated into a textual representation. This paper describes a translation process using a context sensitive parser that eliminates the need to write custom code to decode each individual protocol. It is a template driven top down parser augmented by a constraint engine. The constraint engine is used to implement the context sensitive restrictions.

    References

    [1]
    A. Aho, S. Johnson, "LR Parsing", Computing Surveys of the ACM, Vol 6, No. 2, June 1974, pp 99--124.]]
    [2]
    Apple Computer, Inc. Apple Filing Protocol Programming Guide Version 3.2]]
    [3]
    M. Baker, N. Nottingham, "The application /soap +xml media type, RFC 3902, Sept. 2004, http://www.faqs.org/rfcs/frc3902.html.]]
    [4]
    Beizer, B. Software Testing Techniques, New York, Van Nostrand Reinhold, 1983.]]
    [5]
    Beizer, B. "Software Testing Techniques, Second Edition", New York, Van Nostrand Reinhold, 1990.]]
    [6]
    F. Bolton, Pure Corba, 1st ed., Sams Publishing, July, 2001, ISBN 0672318121.]]
    [7]
    Case, J., Fedor, M., Schoffstall, M., Davin, J. "A Simple Network Management Protocol", IETF 1990. http://www.faqs.org/rfcs/rfc 1157.html]]
    [8]
    Case, J., Mundy, R., Partain, D., Stewart, B., "Introduction and Applicability Statements for Internet Standard Management Framework", RFC 3410, December 2002.]]
    [9]
    J. R. Cordy, "TXL - A Language for Programming Language Tools and Applications", Proc. LDTA 2004, ACM 4th International Workshop on Language Descriptions, Tools and Applications, Edinburg, Scotland, January 2005, pp. 3--31.]]
    [10]
    Dubuisson, O. "ASN.1 Communications Between Heterogeneous Systems". Morgan Kaufmann San Francisco, USA 2001.]]
    [11]
    R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach, T. Berners-Lee, "Hyptertext Transfer Protocol -- HTTP/1.1", RFC 2616, June 1999. http://www.faqs.org/rfcs/rfc2616.html]]
    [12]
    M. Ganapathi, Retargetable code generation and optimization using attribute grammars, Doctoral Thesis, University of Wisconson-Madison, January 1980.]]
    [13]
    M. Griffiths, "LL(1) Grammars and Analyses", Lecture Notes in Computer Science - Compiler Construction, No 21, Springer Verlag, New York, 1974, pp 57--84.]]
    [14]
    M. Henning, S. Vinoski, Advanced CORBA(R) Programming with C++, 1st ed., Addison-Wesley Professional, February, 1999, ISBN 0201379279]]
    [15]
    International Standard 8824 - INTERNATIONAL TELECOMMUNICATION UNION X.208, "Information technology - Open Systems Interconnection -- Specification of Abstract Syntax Notation One (ASN. 1)", 1988.]]
    [16]
    International Standard 8825-1 - INTERNATIONAL TELECOMMUNICATION UNION X.690, "Information Technology - ASN.1 Encoding Rules: Specification of Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding Rules (DER)", http://www.itu.int/ITUT/stu - dygroups/com17/languages/X690_0702.pdf, 2002.]]
    [17]
    R. Kaksonen, A Functional Method for Assessing Protocol Implementation Security, Licentiate Thesis. Espoo. Technical Research Centre of Finland, VTT Publications 447. ISBN 951-38-5873-1]]
    [18]
    R. Kaksonen, M. Laakso, A. Takanen, "Software Security Assessment through Specification Mutations and Fault Injection". Proc. of Communications and Multimedia Security Issues of the New Century / IFIP TC6/TC11 Fifth Joint Working Conference on Communications and Multimedia Security (CMS'01), Darmstadt, Germany, May 2001, ISDN 0-7923-7365-0.]]
    [19]
    U. Lamping, R. Sharpe, E. Warnik, Ethereal User's Guide, 18189 for Ethereal 0.10. 14, 2005, http://www.ethereal.com/, accessed August 10, 2006.]]
    [20]
    U. Lamping, Ethereal Developer's Guide, 18189 for Ethereal 0.10.14, 2005, http://www.ethereal.com/, accessed August 10,2006.]]
    [21]
    Leach, P., Naik, D., Draft-leach-cifs-vlspec-02: A Common Internet File System (CIFS/1.0) Protocol, Expired Internet Draft. IETF, March 13, 1997, http://www.ubiqx.org/cifs/rfc-draft/draft-leach-cifs-v1-spec-02.html]]
    [22]
    Lougheed, K. Rekhter, Y. "A Border Gateway Protocol 4" (BGP-4), IETF 1995, ftp://ftp.rfc-editor.org/in-notes/rfc 1771.txt]]
    [23]
    Marquis, S, Dean T., Knight, G. S. N, SCL: A Language for Security Testing of Network Applications, Proc. CASCON 2005, Toronto, Oct. 2005.]]
    [24]
    B. J. McKenzie, LR Parsing of CFG's wixh Restrictions, Tech Report 8903, Department of Computer Science, University of Canterbury, Christchurch, New Zealand.]]
    [25]
    Moy, J., "OSPF version 2", IETF June 1998, ftp://ftp.rfc-editor.org/innotes/rfc2328.txt]]
    [26]
    SNORT web site at http://www.snort.org, accessed August 10, 2006.]]
    [27]
    Sun, "The Java 2 API specification, version 1.5", Sun Microsystems, Sata Clara, USA 2004.]]
    [28]
    O. Tal, T. R. Dean, G. S. Knight, Y. Turcotte, "Syntax-based Vulnerability Testing of Frame-based Network Protocols", Proceedings of the Second Annual Conference on Privacy, Security, and Trust, Fredericton, Canada 2004, pp. 155--161]]
    [29]
    A. D. Thurston and J. R. Cordy. "A Backtracking LR Algorithm for Parsing Ambiguous Context-Dependent Languages" In 2006 Conference of the Centre for Advanced Studies on Collaborative Research (CASCON 2006). 14 pp., Toronto, October 2006 (to appear).]]
    [30]
    M. Tomita, editor. Generalized LR parsing. Kluwer, Norwell, MA, 1991]]
    [31]
    H. H. Vogt, S. D. Swierstra M. F. Kuiper "Higher order attribute grammars", Proceedings of the ACM SIGPLAN 1989 Conference on Programming language design and implementation, Portland, Oregon, 1989, pp: 131--145]]

    Index Terms

    1. Packet decoding using context sensitive parsing

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image DL Hosted proceedings
      CASCON '06: Proceedings of the 2006 conference of the Center for Advanced Studies on Collaborative research
      October 2006
      388 pages

      Sponsors

      • IBM Toronto Lab
      • CAS

      Publisher

      IBM Corp.

      United States

      Publication History

      Published: 16 October 2006

      Qualifiers

      • Article

      Acceptance Rates

      CASCON '06 Paper Acceptance Rate 24 of 90 submissions, 27%;
      Overall Acceptance Rate 24 of 90 submissions, 27%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 337
        Total Downloads
      • Downloads (Last 12 months)2
      • Downloads (Last 6 weeks)0
      Reflects downloads up to

      Other Metrics

      Citations

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media