Proceedings 2018 Network and Distributed System Security Symposium 2018
DOI: 10.14722/ndss.2018.23159
|View full text |Cite
|
Sign up to set email alerts
|

IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing

Abstract: With more IoT devices entering the consumer market, it becomes imperative to detect their security vulnerabilities before an attacker does. Existing binary analysis based approaches only work on firmware, which is less accessible except for those equipped with special tools for extracting the code from the device. To address this challenge in IoT security analysis, we present in this paper a novel automatic fuzzing framework, called IOTFUZZER, which aims at finding memory corruption vulnerabilities in IoT devi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
137
0

Year Published

2018
2018
2021
2021

Publication Types

Select...
4
4
2

Relationship

0
10

Authors

Journals

citations
Cited by 224 publications
(137 citation statements)
references
References 24 publications
0
137
0
Order By: Relevance
“…It is worth mentioning that application-specific fuzzers have been attracting great interests, e.g., compiler fuzzing [17,19,38,39,43,60], kernel fuzzing [18,32,57], IoT (Internet of Things) fuzzing [15], OS fuzzing [48], smart contract fuzzing [36], GUI testing [59], and deep learning system testing [44]. It is interesting to investigate how to extend our general-purpose fuzzer (e.g., by designing new mutation operators or feedback mechanisms) to be effective in fuzzing specific applications.…”
Section: Related Workmentioning
confidence: 99%
“…It is worth mentioning that application-specific fuzzers have been attracting great interests, e.g., compiler fuzzing [17,19,38,39,43,60], kernel fuzzing [18,32,57], IoT (Internet of Things) fuzzing [15], OS fuzzing [48], smart contract fuzzing [36], GUI testing [59], and deep learning system testing [44]. It is interesting to investigate how to extend our general-purpose fuzzer (e.g., by designing new mutation operators or feedback mechanisms) to be effective in fuzzing specific applications.…”
Section: Related Workmentioning
confidence: 99%
“…For instance, tools for Android, such as Google's Android Monkey [38], generate random test case inputs of user events and system-level events. As another example, IoTFuzzer uses a dynamic analysis to identify IoT app content and mutates that content to detect memory corruptions of IoT devices [22]. To improve test input generation, contemporary approaches use heuristics that guide input generation to cover app source code intelligently, avoid redundant test paths, and enable multi-objective automated testing [18,24,67,79,101].…”
Section: Simulation and Modeling Of Iot Programsmentioning
confidence: 99%
“…e main challenge is that it requires a security expert to write the data model, so it cannot be leveraged to test other devices automatically. Chen et al [65] presented IOTFUZZER that performs a protocol-guarded fuzzing on COTS devices; its key idea is that many IoT devices can be controlled through their official mobile apps. So, they firstly adopted a taintbased approach to track the atomic data that are used to construct the network message; then, they mutated these atomic data dynamically to reuse the original code of message building.…”
Section: Related Workmentioning
confidence: 99%