Skip to content
Yurong Chen edited this page Jan 13, 2020 · 30 revisions

Welcome to the Protocol Customization wiki!

Motivation of this project

The implementations of network protocols are often "bloated" due to various users' needs and complex environment for deployment. The continual expansion of program features contribute to not only growing complexity but also increased the attack surface, making the maintenance of network protocol security very challenging.

Composition of this project

In this project, we have proposed several approaches for automated customization and vulnerability detection of network protocols: CustomPro, DamGate and yFuzz.

CustomPro

In CustomPro, We adopt whole system emulation, dynamic tainting and symbolic execution to identify desired code from the original program binaries, then leverage binary rewriting techniques to create a customized program binary that only contains the desired functionalities.

Go to page

DamGate

In order to manage the program features after the debloating, we propose another binary customization framework, DamGate, to guard the program feature execution on the fly.

Go to page

yFuzz

Also, we have designed a stateful protocol fuzzer that aims to efficiently locate the vulnerabilities residing deep in the stateful protocols.

Go to page

Publications and slides

Publications and presentation slides related to the above-mentioned projects are here.

Contacts

Yurong Chen

Tian Lan

Guru Venkataramani

Clone this wiki locally