Fuzz Testing Virtual ECUs as Part of the Continuous Security Testing Process

被引:0
|
作者
Oka D.K. [1 ]
机构
[1] Synopsys, United States
来源
SAE International Journal of Transportation Cybersecurity and Privacy | 2020年 / 2卷 / 02期
关键词
Continuous security testing; Fuzz testing; Test platform architecture; Virtual ECUs;
D O I
10.4271/11-02-02-0014
中图分类号
学科分类号
摘要
There are already a number of cybersecurity activities introduced in the development process in the automotive industry. For example, security testing of automotive components is often performed at the late stages of development. Fuzz testing is often performed as part of the security testing activity. However, since testing occurs late in the development process, it is expensive and, in some cases, may be too late to fix certain identified issues. Another challenge is that some testing requires hardware that is costly and may not be available until late in the development. We suggest fuzz testing virtual ECUs, which overcomes these challenges and allows for more efficient and effective security testing. By incorporating fuzz testing of virtual electronic control units (ECUs) into the overall test platform, automotive companies can employ a continuous security testing approach that enables the organization to shift left to identify and fix vulnerabilities earlier in the software development life cycle. We explain an approach to performing fuzz testing of virtual ECUs as part of the continuous security process. To this end, we present a test setup for fuzz testing virtual ECUs and give an example of a prototype consisting of a Fuzz Testing Tool integrated with a software-in-the-loop (SiL) Tool. We describe methods for testing the upper layers of the ECU software, and as an example, we discuss results from fuzz testing a diagnostics services implementation on a virtual ECU. To highlight the benefits of fuzz testing virtual ECUs, we give an overview of a test platform architecture that allows for continuous security testing, including various types of security testing, of automotive components earlier in the software development life cycle. By using virtual ECUs in this test platform architecture, it is possible to perform fuzz testing earlier without the need for hardware, as well as perform testing in parallel to improve scalability. Moreover, since the usage of virtual ECUs allows for accessing the internals of the target system, it is possible to enable more intricate instrumentation of the target software to help detect exceptions on the ECU. Finally, besides using fuzz testing tools in the test platform architecture for continuous security testing, organizations can use static application security testing (SAST) and software composition analysis (SCA) tools in the continuous integration (CI) step to identify issues in the embedded software at an early stage. © 2020 SAE International.
引用
收藏
页码:159 / 168
页数:9
相关论文
共 50 条
  • [41] Vulnerability-Oriented Fuzz Testing for Connected Autonomous Vehicle Systems
    Moukahal, Lama J.
    Zulkernine, Mohammad
    Soukup, Martin
    IEEE TRANSACTIONS ON RELIABILITY, 2021, 70 (04) : 1422 - 1437
  • [42] Increasing Fuzz Testing Coverage for Smart Contracts with Dynamic Taint Analysis
    Ji, Songyan
    Dong, Jian
    Qiu, Junfu
    Gu, Bowen
    Wang, Ye
    Wang, Tongqi
    2021 IEEE 21ST INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY (QRS 2021), 2021, : 243 - 247
  • [43] Coverage-Guided Fuzz Testing for Cyber-Physical Systems
    Sheikhi, Sanaz
    Kim, Edward
    Duggirala, Parasara Sridhar
    Bak, Stanley
    2022 13TH ACM/IEEE INTERNATIONAL CONFERENCE ON CYBER-PHYSICAL SYSTEMS (ICCPS 2022), 2022, : 24 - 33
  • [44] Systematic Fuzz Testing Techniques on a Nanosatellite Flight Software for Agile Mission Development
    Gutierrez, Tamara
    Bergel, Alexandre
    Gonzalez, Carlos E.
    Rojas, Camilo J.
    Diaz, Marcos A.
    IEEE ACCESS, 2021, 9 : 114008 - 114021
  • [45] Vulnerability mining method for industrial control network protocol based on fuzz testing
    Lai Y.
    Yang K.
    Liu J.
    Liu Z.
    Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2019, 25 (09): : 2265 - 2279
  • [46] Structurized grammar-based fuzz testing for programs with highly structured inputs
    Yan, Jingbo
    Zhang, Yuqing
    Yang, Dingning
    SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (11) : 1319 - 1330
  • [47] SoliAudit: Smart Contract Vulnerability Assessment Based on Machine Learning and Fuzz Testing
    Liao, Jian-Wei
    Tsai, Tsung-Ta
    He, Chia-Kang
    Tien, Chin-Wei
    2019 SIXTH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS: SYSTEMS, MANAGEMENT AND SECURITY (IOTSMS), 2019, : 458 - 465
  • [48] Towards Effective Guidance of Smart Contract Fuzz Testing Based on Static Analysis
    Park, Jeongwon
    Choi, Jaeseung
    ELECTRONICS, 2025, 14 (04):
  • [49] DoS Exploitation of Allen-Bradley's Legacy Protocol through Fuzz Testing
    Tacliad, Francisco
    Nguyen, Thuy D.
    Gondree, Mark
    3RD ANNUAL INDUSTRIAL CONTROL SYSTEM SECURITY WORKSHOP (ICSS 2017), 2017, : 24 - 31
  • [50] Key Data Location Method for Fuzz Testing Based on Path Label and Data Mutation
    Jiao L.-L.
    Luo S.-L.
    Liu W.-T.
    Pan L.-M.
    Pan, Li-Min (panlimin2016@gmail.com), 1600, Beijing Institute of Technology (40): : 1009 - 1017