Testing the Conformance of Implementations of the EAP Protocol and Its Methods to Internet Specifications


如何引用文章

全文:

开放存取 开放存取
受限制的访问 ##reader.subscriptionAccessGranted##
受限制的访问 订阅存取

详细

Generation of tests for checking the conformance of implementations of the Extensible Authentication Protocol (EAP) and its methods to Internet specifications is described. The project is based on the UniTESK technology that allows one to automate the verification of network protocols using their formal models and the extension JavaTesK, which implements the UniTESK technology in Java. The additional use of mutation testing techniques makes it possible to test the stability of a protocol implementation to corrupt messages. This approach proved to be effective in finding a number of critical vulnerabilities and other deviations from the EAP in some implementations.

作者简介

A. Nikeshin

Ivannikov Institute for System Programming, Russian Academy of Sciences

编辑信件的主要联系方式.
Email: alexn@ispras.ru
俄罗斯联邦, Moscow, 109004

V. Shnitman

Ivannikov Institute for System Programming, Russian Academy of Sciences; Moscow Institute of Physics and Technology

编辑信件的主要联系方式.
Email: vzs@ispras.ru
俄罗斯联邦, Moscow, 109004; Dolgoprudnyi, Moscow oblast, 141700

补充文件

附件文件
动作
1. JATS XML

版权所有 © Pleiades Publishing, Ltd., 2019