In this paper, we propose a new approach to infer state machine models from
protocol implementations. Our method, STATEINSPECTOR, learns protocol states by
using novel program analyses to combine observations of run-time memory and
I/O. It requires no access to source code and only lightweight execution
monitoring of the implementation under test. We demonstrate and evaluate
STATEINSPECTOR’s effectiveness on numerous TLS and WPA/2 implementations. In
the process, we show STATEINSPECTOR enables deeper state discovery, increased
learning efficiency, and more insightful post-mortem analyses than existing
approaches. Further to improved learning, our method led us to discover several
concerning deviations from the standards and a high impact vulnerability in a
prominent Wi-Fi implementation.

By admin