Testing the Conformance of Implementations of the EAP Protocol and Its Methods to Internet Specifications


Cite item

Full Text

Open Access Open Access
Restricted Access Access granted
Restricted Access Subscription Access

Abstract

Generation of tests for checking the conformance of implementations of the Extensible Authentication Protocol (EAP) and its methods to Internet specifications is described. The project is based on the UniTESK technology that allows one to automate the verification of network protocols using their formal models and the extension JavaTesK, which implements the UniTESK technology in Java. The additional use of mutation testing techniques makes it possible to test the stability of a protocol implementation to corrupt messages. This approach proved to be effective in finding a number of critical vulnerabilities and other deviations from the EAP in some implementations.

About the authors

A. V. Nikeshin

Ivannikov Institute for System Programming, Russian Academy of Sciences

Author for correspondence.
Email: alexn@ispras.ru
Russian Federation, Moscow, 109004

V. Z. Shnitman

Ivannikov Institute for System Programming, Russian Academy of Sciences; Moscow Institute of Physics and Technology

Author for correspondence.
Email: vzs@ispras.ru
Russian Federation, Moscow, 109004; Dolgoprudnyi, Moscow oblast, 141700


Copyright (c) 2019 Pleiades Publishing, Ltd.

This website uses cookies

You consent to our cookies if you continue to use our website.

About Cookies