TY - JOUR
T1 - Smart seed selection-based effective black box fuzzing for IIoT protocol
AU - Kim, Sung Jin
AU - Cho, Jaeik
AU - Lee, Changhoon
AU - Shon, Taeshik
N1 - Publisher Copyright:
© 2020, Springer Science+Business Media, LLC, part of Springer Nature.
PY - 2020/12/1
Y1 - 2020/12/1
N2 - Connections of cyber-physical system (CPS) components are gradually increasing owing to the introduction of the Industrial Internet of Things (IIoT). IIoT vulnerability analysis has become a major issue because complex skillful cyber-attacks on CPS systems exploit their zero-day vulnerabilities. However, current white box techniques for vulnerability analysis are difficult to use in real heterogeneous environments, where devices supplied by various manufacturers and diverse firmware versions are used. Therefore, we herein propose a novel protocol fuzzing test technique that can be applied in a heterogeneous environment. As seed configuration can significantly influence the test result in a black box test, we update the seed pool using test cases that travel different program paths compared to the seed. The input, output, and Delta times are used to determine if a new program area has been searched in the black box environment. We experimentally verified the effectiveness of the proposed.
AB - Connections of cyber-physical system (CPS) components are gradually increasing owing to the introduction of the Industrial Internet of Things (IIoT). IIoT vulnerability analysis has become a major issue because complex skillful cyber-attacks on CPS systems exploit their zero-day vulnerabilities. However, current white box techniques for vulnerability analysis are difficult to use in real heterogeneous environments, where devices supplied by various manufacturers and diverse firmware versions are used. Therefore, we herein propose a novel protocol fuzzing test technique that can be applied in a heterogeneous environment. As seed configuration can significantly influence the test result in a black box test, we update the seed pool using test cases that travel different program paths compared to the seed. The input, output, and Delta times are used to determine if a new program area has been searched in the black box environment. We experimentally verified the effectiveness of the proposed.
KW - CPS
KW - Fuzzing test
KW - IIoT
KW - Vulnerability analysis
UR - http://www.scopus.com/inward/record.url?scp=85082751190&partnerID=8YFLogxK
U2 - 10.1007/s11227-020-03245-7
DO - 10.1007/s11227-020-03245-7
M3 - Article
AN - SCOPUS:85082751190
SN - 0920-8542
VL - 76
SP - 10140
EP - 10154
JO - Journal of Supercomputing
JF - Journal of Supercomputing
IS - 12
ER -