Platform for analyzing the security of communication protocols and channels
First Claim
1. A method for analyzing a security of a device under analysis (DUA), comprising:
- attacking the DUA;
observing a response of the DUA to the attack; and
determining whether the DUA includes a security vulnerability.
3 Assignments
0 Petitions
Accused Products
Abstract
A security analyzer tests the security of a device by attacking the device and observing the device'"'"'s response. Attacking the device includes sending one or more messages to the device. A message can be generated by the security analyzer or generated independently of the security analyzer. The security analyzer uses various methods to identify a particular attack that causes a device to fail or otherwise alter its behavior. Monitoring includes analyzing data (other than messages) output from the device in response to an attack. Packet processing analysis includes analyzing one or more messages generated by the device in response to an attack. Instrumentation includes establishing a baseline snapshot of the device'"'"'s state when it is operating normally and then attacking the device in multiple ways while obtaining snapshots periodically during the attacks.
106 Citations
20 Claims
-
1. A method for analyzing a security of a device under analysis (DUA), comprising:
-
attacking the DUA;
observing a response of the DUA to the attack; and
determining whether the DUA includes a security vulnerability. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A method for analyzing a security of a device under analysis (DUA), comprising:
-
sending an instrumentation message to the DUA;
observing a first response of the DUA to the instrumentation message;
attacking the DUA in multiple ways;
sending the instrumentation message to the DUA; and
observing a second response of the DUA to the instrumentation message. - View Dependent Claims (20)
-
Specification