2017
DOI: 10.1007/s11227-017-1980-3
|View full text |Cite
|
Sign up to set email alerts
|

Field classification-based novel fuzzing case generation for ICS protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(3 citation statements)
references
References 16 publications
0
3
0
Order By: Relevance
“…where c n max is the maximum value of the field in the population; c n min is the minimum value of the field in the population. e sum of each field is averaged to calculate the mean center test case, as shown in equation 10, and the calculation method of each field is as in equation (11).…”
Section: Average Similarity and Population Dispersion Of Test Casesmentioning
confidence: 99%
See 1 more Smart Citation
“…where c n max is the maximum value of the field in the population; c n min is the minimum value of the field in the population. e sum of each field is averaged to calculate the mean center test case, as shown in equation 10, and the calculation method of each field is as in equation (11).…”
Section: Average Similarity and Population Dispersion Of Test Casesmentioning
confidence: 99%
“…At present, the commonly used vulnerability mining techniques are divided into static analysis, dynamic analysis, binary comparison, fuzzy testing, and so on [6][7][8][9][10][11][12]. Fuzzy testing has the advantages of high automation, low system consumption, low false-alarm rate, and being independent of the source code of the object program [7].…”
Section: Introductionmentioning
confidence: 99%
“…Shapiro et al [14] used the arpsk tool to perform address resolution protocol spoofing, achieving bidirectional master-slave fuzzing between SCADA clients and servers with the LZFuzz tool. Kim and Shon [15] used coding feature analysis to point out that the MMS protocol in smart grids has syntactic similarities with related ICPs, and designed a cross-domain fuzzing method based on field classification based on this feature. Liu et al [16] introduced a traffic-driven protocol fuzzing scheme for programmable controllers, which involves selecting seeds and bootstrapping states to execute proprietary protocol fuzzing on network daemons.…”
Section: Introductionmentioning
confidence: 99%