Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
A messy state of the union: taming the composite state machines of TLS
Beurdouche B., Bhargavan K., Delignat-Lavaud A., Fournet C., Kohlweiss M., Pironti A., Strub P., Zinzindohoue J.  SP 2015 (Proceedings of the 2015 IEEE Symposium on Security and Privacy, May 17-21, 2015)535-552.2015.Type:Proceedings
Date Reviewed: Oct 5 2016

By bringing consolidated structure to the panoply of requirements that make up the transport layer security (TLS) standard, this paper allows practitioners to formulate a framework for testing how compliant several of their open-source software (OSS) implementations are.

TLS and its precursors have been, for a couple of decades, the lifeblood of secure communication across the Web. Backward compatibility, feature bloat, and many specifications unaware of each other over that lengthy period have together provided a fertile substrate for the culturing of software bugs. This paper contributes a method for framing the assembly of those requirements into a cohesive whole, a mechanism for testing relevant OSS implementations for compliance with that structured assembly, the outcome of such testing (which includes serious vulnerabilities), and an implementation of TLS geared toward correctness rather than performance (therefore arguably not production-ready). The authors have acknowledged limitations as well; for instance, testing is not exhaustive as it disregards many combinations of configuration parameters or content, and vetting, albeit partially automated, depends heavily on manual intervention. The effort is, however, worthwhile.

In addition, the methodology can be an inspiration for other software engineering challenges. The mechanisms are focused on the correctness of TLS, but the underlying guidance can be generalized for the verification of certain software artifacts that are otherwise very difficult to test.

Reviewer:  A. Squassabia Review #: CR144809 (1701-0060)
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Software/ Program Verification (D.2.4 )
 
 
Authentication (D.4.6 ... )
 
 
Protocol Verification (C.2.2 ... )
 
 
Security and Protection (C.2.0 ... )
 
 
Verification (D.4.5 ... )
 
 
Testing And Debugging (D.2.5 )
 
Would you recommend this review?
yes
no
Other reviews under "Software/Program Verification": Date
Verification of sequential and concurrent programs
Krzysztof R., Olderog E., Springer-Verlag New York, Inc., New York, NY, 1991. Type: Book (9780387975320)
Jul 1 1992
On verification of programs with goto statements
Lifschitz V. (ed) Information Processing Letters 18(4): 221-225, 1984. Type: Article
Mar 1 1985
The validation, verification and testing of software
Ince D. (ed), Oxford University Press, Inc., New York, NY, 1985. Type: Book (9789780198590040)
Sep 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy