The new Internet Protocol securityipsec testing with TTCN-3



Similar documents
Protocol Security Where?

Securing IP Networks with Implementation of IPv6

CSCI 454/554 Computer and Network Security. Topic 8.1 IPsec

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

21.4 Network Address Translation (NAT) NAT concept

Network Security. Lecture 3

Network Security Part II: Standards

CS 4803 Computer and Network Security

Chapter 32 Internet Security

Virtual Private Network VPN IPSec Testing: Functionality Interoperability and Performance

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

IPsec Details 1 / 43. IPsec Details

Security Engineering Part III Network Security. Security Protocols (II): IPsec

IP Security. Ola Flygt Växjö University, Sweden

IP SECURITY (IPSEC) PROTOCOLS

Building scalable IPSec infrastructure with MikroTik. IPSec, L2TP/IPSec, OSPF

Lecture 17 - Network Security

Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku

Computer and Network Security Exercise no. 4

Chapter 4 Virtual Private Networking

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts

Lecture 10: Communications Security

Chapter 5: Network Layer Security

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols ETSF10 Internet Protocols 2011

Using IPSec in Windows 2000 and XP, Part 2

Introduction to Computer Security

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

CCNA Security 1.1 Instructional Resource

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

Security Architecture for IP (IPsec)

The application of TTCN-3 in M2M Testing

CS 356 Lecture 27 Internet Security Protocols. Spring 2013

Chapter 9. IP Secure

Introduction to Computer Security

The GO4IT IPv6 Test Tool and Associated services. Alain Vouffo FOKUS (Fraunhofer Institute for Open Communication Systems)

How To Establish IPSec VPN connection between Cyberoam and Mikrotik router

Internet Protocol Security IPSec

Lecture 5.1: IPsec Basics

Introduction to Security and PIX Firewall

z/os Firewall Technology Overview

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

This is a guide on how to create an IPsec VPN tunnel from a local client running Shrew Soft VPN Client to an Opengear device.

Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.

IP Security. IPSec, PPTP, OpenVPN. Pawel Cieplinski, AkademiaWIFI.pl. MUM Wroclaw

Chapter 8 Virtual Private Networking

[SMO-SFO-ICO-PE-046-GU-

IPsec VPN Application Guide REV:

Triple DES Encryption for IPSec

Network Working Group Request for Comments: Category: Standards Track December Security Architecture for the Internet Protocol

MPLS VPN in Cellular Mobile IPv6 Architectures(04##017)

MINI-FAQ: OpenBSD 2.4 IPSEC VPN Configuration

Network Security. Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT)

VPN Modules for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers

Cryptography and Network Security IPSEC

IPsec VPN Security between Aruba Remote Access Points and Mobility Controllers

Network virtualization

IPv6 Fundamentals: A Straightforward Approach

Dr. Arjan Durresi. Baton Rouge, LA These slides are available at:

Security issues with Mobile IP

UVOIP: CROSS-LAYER OPTIMIZATION OF BUFFER OPERATIONS FOR PROVIDING SECURE VOIP SERVICES ON CONSTRAINED EMBEDDED DEVICES

Computer Networks. Secure Systems

ICSA Labs Network Protection Devices Test Specification Version 1.3

Computer and Network Security

This section provides a summary of using network location profiles to identify network connection types. Details include:

Virtual Private Networks: IPSec vs. SSL

IPSec Network Security Commands

Configuring a Lan-to-Lan VPN with Overlapping Subnets with Juniper NetScreen/ISG/SSG Products

EITF25 Internet Techniques and Applications L5: Wide Area Networks (WAN) Stefan Höst

Cisco QuickVPN Installation Tips for Windows Operating Systems

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Deploying IPSec VPN in the Enterprise

Implementing and Managing Security for Network Communications

Configuring SIP Support for SRTP

VPNs. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright Palo Alto Networks

Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

Insecure network services. Firewalls. Two separable topics. Packet filtering. Example: blocking forgeries. Example: blocking outgoing mail

Virtual Private Networks

VOIP-211RS/210RS/220RS/440S. SIP VoIP Router. User s Guide

The BANDIT Products in Virtual Private Networks

CSCI 454/554 Computer and Network Security. Final Exam Review

Introduction. An Overview of the DX Industrial Router Product Line. IP router and firewall. Integrated WAN, Serial and LAN interfaces

Chapter 10. Network Security

VPN. VPN For BIPAC 741/743GE

Laboratory Exercises V: IP Security Protocol (IPSec)

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

NATIONAL RESEARCH AGENCY CASE STUDY - CCTV NETWORK SERVICES

Moonv6 Test Suite. IPv6 Firewall Base Functionality Test Suite. Technical Document. Revision 0.11

Configuring TheGreenBow VPN Client with a TP-LINK VPN Router

High Performance VPN Solutions Over Satellite Networks

Cisco Networks (ONT) 2006 Cisco Systems, Inc. All rights reserved.

Transcription:

The new Internet Protocol security testing with TTCN-3 Ariel Sabiguero 1,2 María Eugenia Corti 1 César Viho 2 1 Instituto de Computación, Facultad de Ingeniería, Universidad de la República J. Herrera y Reissig 565, Montevideo, Uruguay {asabigue,mcorti}@fing.edu.uy 2 IRISA / Dionysos Campus Universitaire de Beaulieu 35042 Rennes CEDEX, France {asabigue,viho}@irisa.fr 30/05/2007 The new Internet Protocol security testing with TTCN-3

Overview of relevant concepts General test description Selected test case description IRISA T3DevKit GNU crypto library Implementation alternatives CoDec based development CoDec+ExtFunctions development Code engineering Test Specification Size Performance The new Internet Protocol security testing with TTCN-3

Suite of security protocols Overview of relevant concepts General test description Selected test case description Connectionless Integrity Authentication Header (AH) Encapsulating Security Payload (ESP) The new Internet Protocol security testing with TTCN-3

Suite of security protocols Overview of relevant concepts General test description Selected test case description Connectionless Integrity Data Origin Authentication Authentication Header (AH) Encapsulating Security Payload (ESP) The new Internet Protocol security testing with TTCN-3

Suite of security protocols Overview of relevant concepts General test description Selected test case description Connectionless Integrity Data Origin Authentication Access Control Authentication Header (AH) Encapsulating Security Payload (ESP) The new Internet Protocol security testing with TTCN-3

Suite of security protocols Overview of relevant concepts General test description Selected test case description Authentication Header (AH) Connectionless Integrity Data Origin Authentication Access Control Confidentiality Encapsulating Security Payload (ESP) The new Internet Protocol security testing with TTCN-3

Overview of relevant concepts General test description Selected test case description Set of cryptographic algorithms Encryption algorithm 3DES-CBC Authentication algorithm The new Internet Protocol security testing with TTCN-3

Overview of relevant concepts General test description Selected test case description Set of cryptographic algorithms Encryption algorithm 3DES-CBC NULL Authentication algorithm The new Internet Protocol security testing with TTCN-3

Overview of relevant concepts General test description Selected test case description Set of cryptographic algorithms Encryption algorithm 3DES-CBC NULL AES-CBC Authentication algorithm The new Internet Protocol security testing with TTCN-3

Overview of relevant concepts General test description Selected test case description Set of cryptographic algorithms Encryption algorithm 3DES-CBC NULL AES-CBC AES-CTR Authentication algorithm The new Internet Protocol security testing with TTCN-3

Overview of relevant concepts General test description Selected test case description Set of cryptographic algorithms Encryption algorithm 3DES-CBC NULL AES-CBC AES-CTR Authentication algorithm HMAC-SHA1-96 The new Internet Protocol security testing with TTCN-3

Overview of relevant concepts General test description Selected test case description Set of cryptographic algorithms Encryption algorithm 3DES-CBC NULL AES-CBC AES-CTR Authentication algorithm HMAC-SHA1-96 NULL The new Internet Protocol security testing with TTCN-3

Overview of relevant concepts General test description Selected test case description Set of cryptographic algorithms Encryption algorithm 3DES-CBC NULL AES-CBC AES-CTR Authentication algorithm HMAC-SHA1-96 NULL AES-XCBX-MAC-96 The new Internet Protocol security testing with TTCN-3

modes Outline Overview of relevant concepts General test description Selected test case description Network Network Client A Transport mode Client B Client A Tunnel mode Client B The new Internet Protocol security testing with TTCN-3

Overview of relevant concepts General test description Selected test case description SPD and SA Security Policy Database control traffic The new Internet Protocol security testing with TTCN-3

Overview of relevant concepts General test description Selected test case description SPD and SA Security Policy Database control traffic consulted for incoming and outgoing traffic The new Internet Protocol security testing with TTCN-3

Overview of relevant concepts General test description Selected test case description SPD and SA Security Policy Database control traffic consulted for incoming and outgoing traffic Security Association The new Internet Protocol security testing with TTCN-3

Overview of relevant concepts General test description Selected test case description SPD and SA Security Policy Database control traffic consulted for incoming and outgoing traffic Security Association simplex connection that affords security services to the traffic carried by it. The new Internet Protocol security testing with TTCN-3

Overview of relevant concepts General test description Selected test case description SPD and SA Security Policy Database control traffic consulted for incoming and outgoing traffic Security Association simplex connection that affords security services to the traffic carried by it. each SA an entry in the SA Database (SAD) The new Internet Protocol security testing with TTCN-3

Overview of relevant concepts General test description Selected test case description SPD and SA Security Policy Database control traffic consulted for incoming and outgoing traffic Security Association simplex connection that affords security services to the traffic carried by it. each SA an entry in the SA Database (SAD) one SA for each traffic direction The new Internet Protocol security testing with TTCN-3

v6rl test suite coverage Overview of relevant concepts General test description Selected test case description Tunnel and Transport mode The new Internet Protocol security testing with TTCN-3

Overview of relevant concepts General test description Selected test case description v6rl test suite coverage Tunnel and Transport mode A combination of authentication and encryption algorithms The new Internet Protocol security testing with TTCN-3

Overview of relevant concepts General test description Selected test case description v6rl test suite coverage Tunnel and Transport mode A combination of authentication and encryption algorithms Only ESP The new Internet Protocol security testing with TTCN-3

Overview of relevant concepts General test description Selected test case description v6rl test suite coverage Tunnel and Transport mode A combination of authentication and encryption algorithms Only ESP Manual key configuration The new Internet Protocol security testing with TTCN-3

Overview of relevant concepts General test description Selected test case description v6rl test suite coverage Tunnel and Transport mode A combination of authentication and encryption algorithms Only ESP Manual key configuration ICMPv6 messages exchange The new Internet Protocol security testing with TTCN-3

Overview of relevant concepts General test description Selected test case description Test case 5.2.3 NUT Transport mode tested 3DES-CBC encryption algorithm NULL authentication algorithm NUT_Link0=PF0::some_address ROUTER1_Link0=PF0::f ROUTER1 ROUTER1_Link1=PF1::f HOST1_Link1=PF1::1 HOST1 The new Internet Protocol security testing with TTCN-3

Overview of relevant concepts General test description Selected test case description Test case 5.2.3 NUT Transport mode tested 3DES-CBC encryption algorithm NULL authentication algorithm NUT_Link0=PF0::some_address ROUTER1_Link0=PF0::f ROUTER1 ROUTER1_Link1=PF1::f HOST1_Link1=PF1::1 HOST1 The new Internet Protocol security testing with TTCN-3

Overview of relevant concepts General test description Selected test case description Test case 5.2.3 NUT Transport mode tested 3DES-CBC encryption algorithm NULL authentication algorithm NUT_Link0=PF0::some_address ROUTER1_Link0=PF0::f ROUTER1 ROUTER1_Link1=PF1::f HOST1_Link1=PF1::1 HOST1 The new Internet Protocol security testing with TTCN-3

T3DevKit & IPv6 ATS IRISA T3DevKit GNU crypto library Why? Helper tool for implementing TA-PA, TRI-SA and TCI-CD The new Internet Protocol security testing with TTCN-3

IRISA T3DevKit GNU crypto library T3DevKit & IPv6 ATS Why? Helper tool for implementing TA-PA, TRI-SA and TCI-CD Works in C++ environment, adequate for testing The new Internet Protocol security testing with TTCN-3

IRISA T3DevKit GNU crypto library T3DevKit & IPv6 ATS Why? Helper tool for implementing TA-PA, TRI-SA and TCI-CD Works in C++ environment, adequate for testing Existing IPv6 ATS enables code reuse (IPv6, ICMPv6, etc.) The new Internet Protocol security testing with TTCN-3

IRISA T3DevKit GNU crypto library T3DevKit & IPv6 ATS Why? Helper tool for implementing TA-PA, TRI-SA and TCI-CD Works in C++ environment, adequate for testing Existing IPv6 ATS enables code reuse (IPv6, ICMPv6, etc.) Freely available under CeCILL-C license The new Internet Protocol security testing with TTCN-3

GNU crypto library Outline IRISA T3DevKit GNU crypto library General purpose cryptographic library The new Internet Protocol security testing with TTCN-3

IRISA T3DevKit GNU crypto library GNU crypto library General purpose cryptographic library Several cryptographic algorithms provided The new Internet Protocol security testing with TTCN-3

IRISA T3DevKit GNU crypto library GNU crypto library General purpose cryptographic library Several cryptographic algorithms provided All cryptographic functions implemented The new Internet Protocol security testing with TTCN-3

IRISA T3DevKit GNU crypto library GNU crypto library General purpose cryptographic library Several cryptographic algorithms provided All cryptographic functions implemented Broad user base and examples on-line The new Internet Protocol security testing with TTCN-3

IRISA T3DevKit GNU crypto library GNU crypto library General purpose cryptographic library Several cryptographic algorithms provided All cryptographic functions implemented Broad user base and examples on-line Freely available under LGPL license The new Internet Protocol security testing with TTCN-3

Implementation alternatives CoDec based development CoDec+ExtFunctions development Test case engineering Just an ICMPv6 Echo Request and Echo Reply exchanged Simple message sequence Messages use 3DES-CBC encryption with PSK Complex assembly and disassembly Where to perform cryptographic operations? The new Internet Protocol security testing with TTCN-3

Implementation alternatives CoDec based development CoDec+ExtFunctions development Test case engineering Just an ICMPv6 Echo Request and Echo Reply exchanged Simple message sequence Messages use 3DES-CBC encryption with PSK Complex assembly and disassembly Where to perform cryptographic operations? The new Internet Protocol security testing with TTCN-3

Implementation alternatives CoDec based development CoDec+ExtFunctions development Test case engineering Just an ICMPv6 Echo Request and Echo Reply exchanged Simple message sequence Messages use 3DES-CBC encryption with PSK Complex assembly and disassembly Where to perform cryptographic operations? The new Internet Protocol security testing with TTCN-3

Test case engineering Outline Implementation alternatives CoDec based development CoDec+ExtFunctions development Just an ICMPv6 Echo Request and Echo Reply exchanged Simple message sequence Messages use 3DES-CBC encryption with PSK Complex assembly and disassembly Where to perform cryptographic operations? CoDec External Functions The new Internet Protocol security testing with TTCN-3

Implementation alternatives CoDec based development CoDec+ExtFunctions development CoDec only Transmission ESP message modeled in TTCN-3 Checksum and padding fields calculated in the CoDec Payload encrypted in the CoDec Link1.send(ICMPv6WithESP_EchoRequest_AuthNULL(SPI_SA1, O)); The new Internet Protocol security testing with TTCN-3

Implementation alternatives CoDec based development CoDec+ExtFunctions development CoDec only Transmission ESP message modeled in TTCN-3 Checksum and padding fields calculated in the CoDec Payload encrypted in the CoDec Link1.send(ICMPv6WithESP_EchoRequest_AuthNULL(SPI_SA1, O)); The new Internet Protocol security testing with TTCN-3

Implementation alternatives CoDec based development CoDec+ExtFunctions development CoDec only Transmission ESP message modeled in TTCN-3 Checksum and padding fields calculated in the CoDec Payload encrypted in the CoDec Link1.send(ICMPv6WithESP_EchoRequest_AuthNULL(SPI_SA1, O)); The new Internet Protocol security testing with TTCN-3

CoDec only Reception Implementation alternatives CoDec based development CoDec+ExtFunctions development alt //Receive the correct answer [] Link1.receive(ICMPv6WithESP_EchoReply_AuthNULL (SPI_SA2, O)) { setverdict(pass); replytimer.stop; } //Receive incorrect answer [] Link1.receive { setverdict(fail); replytimer.stop; } //Receive no answer [] replytimer.timeout { setverdict(fail); } The new Internet Protocol security testing with TTCN-3

CoDec only Reception Implementation alternatives CoDec based development CoDec+ExtFunctions development alt //Receive the correct answer [] Link1.receive(ICMPv6WithESP_EchoReply_AuthNULL (SPI_SA2, O)) { setverdict(pass); replytimer.stop; } //Receive incorrect answer [] Link1.receive { setverdict(fail); replytimer.stop; } //Receive no answer [] replytimer.timeout { setverdict(fail); } The new Internet Protocol security testing with TTCN-3

CoDec only Reception Implementation alternatives CoDec based development CoDec+ExtFunctions development alt //Receive the correct answer [] Link1.receive(ICMPv6WithESP_EchoReply_AuthNULL (SPI_SA2, O)) { setverdict(pass); replytimer.stop; } //Receive incorrect answer [] Link1.receive { setverdict(fail); replytimer.stop; } //Receive no answer [] replytimer.timeout { setverdict(fail); } The new Internet Protocol security testing with TTCN-3

CoDec+Ext Transmission Implementation alternatives CoDec based development CoDec+ExtFunctions development template ESPMessage ICMPv6ESPMessage (IPv6AddressType src, IPv6AddressType dst, octetstring m_spi, octetstring m_data, UInt16 checksum) := { } SPI:= m_spi, SeqNum := 1, Payload := EncryptPayload(src, dst, EchoRequestType, m_data, checksum), ICV :=omit The new Internet Protocol security testing with TTCN-3

CoDec+Ext Reception Implementation alternatives CoDec based development CoDec+ExtFunctions development alt{ } //Receive correct answer, unverified encrypted payload [] Link1.receive(ICMPv6ESPMessage_Answer_AuthNULL (PF0_1, PF1_1, SPI_SA2, DATA, checksum)) -> value Myvar { var bitstring encpayload := Myvar.Payload; var UInt8 payloadlength := lengthof(encpayload)/8; var EncPayload payload := DecriptPayload(encpayload, payloadlength); if (match(payload, ICMPv6EncPayload_Answer(PF0_1, PF1_1, DATA))) { setverdict(pass); } else { setverdict(fail); } replytimer.stop; } //Receive incorrect answer [] Link1.receive { setverdict(fail); replytimer.stop; } //Receive no answer [] replytimer.timeout { setverdict(fail); } The new Internet Protocol security testing with TTCN-3

CoDec+Ext Reception Implementation alternatives CoDec based development CoDec+ExtFunctions development alt{ } //Receive correct answer, unverified encrypted payload [] Link1.receive(ICMPv6ESPMessage_Answer_AuthNULL (PF0_1, PF1_1, SPI_SA2, DATA, checksum)) -> value Myvar { var bitstring encpayload := Myvar.Payload; var UInt8 payloadlength := lengthof(encpayload)/8; var EncPayload payload := DecriptPayload(encpayload, payloadlength); if (match(payload, ICMPv6EncPayload_Answer(PF0_1, PF1_1, DATA))) { setverdict(pass); } else { setverdict(fail); } replytimer.stop; } //Receive incorrect answer [] Link1.receive { setverdict(fail); replytimer.stop; } //Receive no answer [] replytimer.timeout { setverdict(fail); } The new Internet Protocol security testing with TTCN-3

CoDec+Ext Reception Implementation alternatives CoDec based development CoDec+ExtFunctions development alt{ } //Receive correct answer, unverified encrypted payload [] Link1.receive(ICMPv6ESPMessage_Answer_AuthNULL (PF0_1, PF1_1, SPI_SA2, DATA, checksum)) -> value Myvar { var bitstring encpayload := Myvar.Payload; var UInt8 payloadlength := lengthof(encpayload)/8; var EncPayload payload := DecriptPayload(encpayload, payloadlength); if (match(payload, ICMPv6EncPayload_Answer(PF0_1, PF1_1, DATA))) { setverdict(pass); } else { setverdict(fail); } replytimer.stop; } //Receive incorrect answer [] Link1.receive { setverdict(fail); replytimer.stop; } //Receive no answer [] replytimer.timeout { setverdict(fail); } The new Internet Protocol security testing with TTCN-3

Code engineering Test Specification Size Performance Message transmission & reception CoDec High ATS abstraction (too much?) External Functions The new Internet Protocol security testing with TTCN-3

Code engineering Test Specification Size Performance Message transmission & reception CoDec High ATS abstraction (too much?) External Functions More control from ATS The new Internet Protocol security testing with TTCN-3

Code engineering Test Specification Size Performance Message transmission & reception CoDec High ATS abstraction (too much?) Increased CoDec complexity External Functions More control from ATS The new Internet Protocol security testing with TTCN-3

Code engineering Test Specification Size Performance Message transmission & reception CoDec High ATS abstraction (too much?) Increased CoDec complexity External Functions More control from ATS CoDec just encode and decode The new Internet Protocol security testing with TTCN-3

Code engineering Test Specification Size Performance Message transmission & reception CoDec High ATS abstraction (too much?) Increased CoDec complexity Difficult code factorization and reuse External Functions More control from ATS CoDec just encode and decode The new Internet Protocol security testing with TTCN-3

Code engineering Test Specification Size Performance Message transmission & reception CoDec High ATS abstraction (too much?) Increased CoDec complexity Difficult code factorization and reuse External Functions More control from ATS CoDec just encode and decode Software engineering techniques applicable The new Internet Protocol security testing with TTCN-3

Code engineering Test Specification Size Performance loc based metrics The new Internet Protocol security testing with TTCN-3

Performance Outline Code engineering Test Specification Size Performance Every time an external function is invoked, encode and decode operations on the CoDec are invoked The new Internet Protocol security testing with TTCN-3

Code engineering Test Specification Size Performance Performance Every time an external function is invoked, encode and decode operations on the CoDec are invoked External functions based approach requires 4 external function invocations. The new Internet Protocol security testing with TTCN-3

Code engineering Test Specification Size Performance Performance Every time an external function is invoked, encode and decode operations on the CoDec are invoked External functions based approach requires 4 external function invocations. Not relevant in conformance or interoperability testing, but might be critical for other test paradigms. The new Internet Protocol security testing with TTCN-3

Final remarks Ongoing research for more thorough analysis Both methodologies are valid and applicable, with consistent results Excessively complex CoDec development diverges from TTCN-3 philosophy When performance degradation is allowed, external functions provide better code properties and a cleaner solution The new Internet Protocol security testing with TTCN-3

Final remarks Ongoing research for more thorough analysis Both methodologies are valid and applicable, with consistent results Excessively complex CoDec development diverges from TTCN-3 philosophy When performance degradation is allowed, external functions provide better code properties and a cleaner solution The new Internet Protocol security testing with TTCN-3

Final remarks Ongoing research for more thorough analysis Both methodologies are valid and applicable, with consistent results Excessively complex CoDec development diverges from TTCN-3 philosophy When performance degradation is allowed, external functions provide better code properties and a cleaner solution The new Internet Protocol security testing with TTCN-3

Final remarks Ongoing research for more thorough analysis Both methodologies are valid and applicable, with consistent results Excessively complex CoDec development diverges from TTCN-3 philosophy When performance degradation is allowed, external functions provide better code properties and a cleaner solution The new Internet Protocol security testing with TTCN-3

Thank you for your time Questions? http://www.irisa.fr/tipi/publi/t3uc2007paper.pdf The new Internet Protocol security testing with TTCN-3