Testing the Conformance of Implementations of the EAP Protocol and Its Methods to Internet Specifications
- 作者: Nikeshin A.V.1, Shnitman V.Z.1,2
-
隶属关系:
- Ivannikov Institute for System Programming, Russian Academy of Sciences
- Moscow Institute of Physics and Technology
- 期: 卷 45, 编号 7 (2019)
- 页面: 417-423
- 栏目: Article
- URL: https://journals.rcsi.science/0361-7688/article/view/176958
- DOI: https://doi.org/10.1134/S0361768819070090
- ID: 176958
如何引用文章
详细
Generation of tests for checking the conformance of implementations of the Extensible Authentication Protocol (EAP) and its methods to Internet specifications is described. The project is based on the UniTESK technology that allows one to automate the verification of network protocols using their formal models and the extension JavaTesK, which implements the UniTESK technology in Java. The additional use of mutation testing techniques makes it possible to test the stability of a protocol implementation to corrupt messages. This approach proved to be effective in finding a number of critical vulnerabilities and other deviations from the EAP in some implementations.
作者简介
A. Nikeshin
Ivannikov Institute for System Programming, Russian Academy of Sciences
编辑信件的主要联系方式.
Email: alexn@ispras.ru
俄罗斯联邦, Moscow, 109004
V. Shnitman
Ivannikov Institute for System Programming, Russian Academy of Sciences; Moscow Institute of Physics and Technology
编辑信件的主要联系方式.
Email: vzs@ispras.ru
俄罗斯联邦, Moscow, 109004; Dolgoprudnyi, Moscow oblast, 141700
补充文件
