|国家预印本平台
首页|An Automated Blackbox Noncompliance Checker for QUIC Server Implementations

An Automated Blackbox Noncompliance Checker for QUIC Server Implementations

An Automated Blackbox Noncompliance Checker for QUIC Server Implementations

来源:Arxiv_logoArxiv
英文摘要

We develop QUICtester, an automated approach for uncovering non-compliant behaviors in the ratified QUIC protocol implementations (RFC 9000/9001). QUICtester leverages active automata learning to abstract the behavior of a QUIC implementation into a finite state machine (FSM) representation. Unlike prior noncompliance checking methods, to help uncover state dependencies on event timing, QUICtester introduces the idea of state learning with event timing variations, adopting both valid and invalid input configurations, and combinations of security and transport layer parameters during learning. We use pairwise differential analysis of learned behaviour models of tested QUIC implementations to identify non-compliance instances as behaviour deviations in a property-agnostic way. This exploits the existence of the many different QUIC implementations, removing the need for validated, formal models. The diverse implementations act as cross-checking test oracles to discover non-compliance. We used QUICtester to analyze analyze 186 learned models from 19 QUIC implementations under the five security settings and discovered 55 implementation errors. Significantly, the tool uncovered a QUIC specification ambiguity resulting in an easily exploitable DoS vulnerability, led to 5 CVE assignments from developers, and two bug bounties thus far.

Kian Kai Ang、Guy Farrelly、Cheryl Pope、Damith C. Ranasinghe

通信无线通信计算技术、计算机技术

Kian Kai Ang,Guy Farrelly,Cheryl Pope,Damith C. Ranasinghe.An Automated Blackbox Noncompliance Checker for QUIC Server Implementations[EB/OL].(2025-05-19)[2025-06-22].https://arxiv.org/abs/2505.12690.点此复制

评论