1 of 15

You Li*a, Kaiyu Hou*b, Yunqi Hea, Yan Chena, and Hai Zhoua

aNorthwestern University�bAlibaba Cloud**

Property Guided Secure Configuration Space Search

ISC 2024, Arlington, VA

*Equal Contribution

**Any opinions, recommendations, or findings are those of the authors and do not reflect the

views of Alibaba Cloud.

2 of 15

Outline

2

  • Motivations and problem definition
    • The importance of configuration verification and drawbacks in current methods
    • Leverage “secure configuration space” to enable real-time verification
  • Technical contributions
    • Convert configuration verification into a model checking problem
    • Reduce the decision problem into a search problem
    • Heuristics to improve search coverage
  • Evaluations on testbenches and network protocols

3 of 15

Motivation: Configuration Verification

3

  • Network configurations are constantly changing to:
    • support new services, accommodate new devices, enhance network security, etc.
  • Errors in configuration changes can cause catastrophic network outages:
    • 56% of network incidents due to configuration changes in a leading cloud provider
  • Network configuration verification checks before deployment whether a new configuration satisfies a set of desired correctness properties:
    • reachability, way-pointing, loop-freedom…

4 of 15

Drawbacks of Existing Methods

4

  • Network verification is time consuming:
    • Verification out of time (24h) for Purdue topology (2159 nodes & 3,607 links)
  • Real-time network verification should be agile:
    • Check the correctness of configurations as they are deployed to real networks.

5 of 15

Secure Configuration Space

5

  • We aim to find a secure configuration space: any configurations within the space are guaranteed to be secure.
  • It reduces the original online decision problem into i) an offline search problem and ii) an online SAT query.
  • Additionally, it can suggest a correct alternative configuration that is as close as possible to the previous insecure configuration.

6 of 15

Secure Configuration Space

6

  • We aim to find a secure configuration space: any configurations within the space are guaranteed to be secure.

7 of 15

Advantages of Secure Configuration Space

7

  • It reduces the original online decision problem into i) an offline search problem and ii) an online SAT query.
  • Additionally, it can suggest a correct alternative configuration that is as close as possible to the previous insecure configuration.

8 of 15

Technical Contribution: Framework

8

9 of 15

Encode Configuration into State Space

9

  • We add configuration state variables alongside the normal state variables to implicitly encode configurations:
    • The configuration state variables are unconstrained at initialization, and their values remain unchanged during the execution.
    • In contrast, the normal state variables are constrained to the reset state at initialization, and their values can evolve as usual during the execution.

10 of 15

Enlargement of Secure Configuration Space

10

  • Inclusive Expansion: Suppose IV1 is the initial secure state space, we set IV1 as the initiation constraint and expands the secure state space to IV2
  • Parallel Expansion: we set S6 as the initiation constraint and start another search, thus yields a larger secure state space IV2IV3

11 of 15

Enlargement of Secure Configuration Space

11

  • Inclusive Expansion: Suppose IV1 is the initial secure state space, we set IV1 as the initiation constraint and expands the secure state space to IV2

12 of 15

Enlargement of Secure Configuration Space

12

  • Parallel Expansion: we set S6 as the initiation constraint and start another search, thus yields a larger secure state space IV2IV3

13 of 15

Evaluation: Safety Properties

13

(a) Safe benchmarks: our algorithm (INCISE) achieves better coverage, e.g., larger safe configuration space than others on safe benchmarks.

(b) Unsafe benchmarks: INCISE still works on unsafe benchmarks, while the other algorithms cannot find a valid invariant.

14 of 15

Case Study: Cellular Emergency Protocols

14

15 of 15

You Li*a, Kaiyu Hou*b, Yunqi Hea, Yan Chena, and Hai Zhoua

aNorthwestern University�bAlibaba Cloud**

Thank you!