ENDADUL
Updated 350 days ago
Network protocols are notorious for their complexity. Implementing them correctly is crucial to the success of secure communication. However, research efforts to defend these implementations by advocating best practices in secure programming or formally verifying the correctness of the protocol designs are not always effective, nor sufficient, as indicated by the frequent reports of bugs discovered in protocol implementations after their deployment. This is because developers often unwittingly introduce elusive functional bugs into the code, resulting in deviations from protocol-compliant behavior. Such noncompliance instances can lead to incorrect results, interoperability issues, or critical security implications (e.g., impersonation attacks, breaking security guarantees). Detecting functional bugs is hard because while violating the protocol-compliant behavior, these bugs do not always display externally observable artifacts (e.g., crash). Therefore, in our research, we aim to..