Loading Seminars

« All Seminars

Blackbox and Grey-box Approaches to Protocol State Machine Learning (With Lots of Attacks Against TLS and WPA)

December 14 (2022) @ 3:00 pm - 4:00 pm

Abstract: Protocol state machine learning has been used to analyse many cryptographic protocols. Unlike fuzzing it can find logical flaws in protocols and unlike formal modelling it can find vulnerabilities in implementations. I will outline how black box state machine methods work, and describe how we have applied them to WPA to find two downgrade attacks. I will then describe a grey box learning method we have developed that uses memory snapshots and symbolic execution of the binary, combined with observations of run-time memory and a protocol’s inputs and outputs to learn its state machine. We show that this grey box method is much more efficient than black box learning, allowing us to test protocols in much more detail and leading to the discovery of new attacks against implementations of TLS and WPA.

This is joint work with: Chris McMahon Stone, Sam L. Thomas, Joeri de Ruiter, Mathy Vanhoef, James Henderson and Nicolas Bailluet

This is a joint seminar with FM-SEC.

Attendance via Zoom (link to follow)

Livestream via YouTube (link to follow)


December 14 (2022)
3:00 pm - 4:00 pm
Seminar Tags:
, , ,


Tom Chothia (University of Birmingham)

Tom Chothia is a Reader in cyber security at the University of Birmingham, he likes to use formal methods and to hack stuff. See Tom's homepage: https://www.cs.bham.ac.uk/~tpc

Leave a Reply

Your email address will not be published. Required fields are marked *