Skip to content
Yurong Chen edited this page Feb 11, 2020 · 30 revisions

Welcome to the project WIKI page of Protocol Customization 🎉 🎉 🎉!

Motivation of this project

The implementations of network protocols are often "bloated" due to various users' needs and complex environment for deployment. The continual expansion of program features contribute to not only growing complexity but also increased the attack surface, making the maintenance of network protocol security very challenging.

Composition of this project

In this project, we have proposed several approaches for automated customization and vulnerability detection of network protocols: CustomPro, DamGate and yFuzz.

CustomPro

In CustomPro, We adopt whole system emulation, dynamic tainting and symbolic execution to identify desired code from the original program binaries, then leverage binary rewriting techniques to create a customized program binary that only contains the desired functionalities.

➡️ Go to page

yFuzz

Also, we have designed a stateful protocol fuzzer that aims to efficiently locate the vulnerabilities residing deep in the stateful protocols.

➡️ Go to page

Publications and slides

Publications 📚 and presentation slides 🎥 related to the above-mentioned projects are here 👍.

Contacts

Tian Lan

Guru Venkataramani

Yurong Chen