Research on Network Protocol Vulnerability Discovery Based on Fuzz Testing

被引:0
|
作者
Li, Mingxuan [1 ]
He, Ling [1 ]
Teng, YangXin [1 ]
Wang, Xu [1 ]
Zhang, Jianye [2 ]
Qing, Song [2 ]
机构
[1] State Grid Xinjiang Elect Power Res Inst, Informat & Commun Technol Ctr, Urumqi, Peoples R China
[2] State Grid Xinjiang Elect Power Co, Urumqi, Peoples R China
来源
PROCEEDINGS OF 2017 IEEE 2ND INFORMATION TECHNOLOGY, NETWORKING, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (ITNEC) | 2017年
关键词
network protocol vulnerability discovery; fuzz testing; heuristic test case generation; Peach;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Since the network application programs are developed rapidly, and the requirement of network protocol security is continually improved, the fuzz testing has become the research hotspot. On the basis of summarizing the current research direction, the identification method and test case generation of network protocol are researched emphatically. The heuristic fuzz testing framework based on parameter weight is proposed according to heuristic search algorithm and probability weights. The existing fuzz testing and vulnerability mining tool Peach is selected for extension, in which the heuristic input tracking technology based on parameter weight is adopted by the data generation module; IDAPRO is used to extract the function's heuristic factor to form the heuristic rules, and then the heuristic rules are used to guide the test case generation process; the transmission order of test cases is determined based on parameter weight. Finally, the commonly-used FTP protocol was verified with development tools. The test results verify that the heuristic fuzz testing framework based on parameter weight achieved the expected effect.
引用
收藏
页码:1354 / 1358
页数:5
相关论文
共 26 条
  • [1] Vulnerability mining method for industrial control network protocol based on fuzz testing
    Lai Y.
    Yang K.
    Liu J.
    Liu Z.
    Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS, 2019, 25 (09): : 2265 - 2279
  • [2] Network protocol fuzz testing for information systems and applications: a survey and taxonomy
    Munea, Tewodros Legesse
    Lim, Hyunwoo
    Shon, Taeshik
    MULTIMEDIA TOOLS AND APPLICATIONS, 2016, 75 (22) : 14745 - 14757
  • [3] Network protocol fuzz testing for information systems and applications: a survey and taxonomy
    Tewodros Legesse Munea
    Hyunwoo Lim
    Taeshik Shon
    Multimedia Tools and Applications, 2016, 75 : 14745 - 14757
  • [4] SoliAudit: Smart Contract Vulnerability Assessment Based on Machine Learning and Fuzz Testing
    Liao, Jian-Wei
    Tsai, Tsung-Ta
    He, Chia-Kang
    Tien, Chin-Wei
    2019 SIXTH INTERNATIONAL CONFERENCE ON INTERNET OF THINGS: SYSTEMS, MANAGEMENT AND SECURITY (IOTSMS), 2019, : 458 - 465
  • [5] Fuzz Testing based on Sulley Framework
    Guo, Zhong
    Li, Nan
    CURRENT TRENDS IN COMPUTER SCIENCE AND MECHANICAL AUTOMATION, VOL 1, 2017, : 181 - 187
  • [6] Fuzz Testing Based on Virtualization Technology
    Zhou, Longbin
    Li, Zhoujun
    PROCEEDINGS OF 2018 INTERNATIONAL CONFERENCE ON COMPUTING AND ARTIFICIAL INTELLIGENCE (ICCAI 2018), 2018, : 57 - 61
  • [7] Polar: Function Code Aware Fuzz Testing of ICS Protocol
    Luo, Zhengxiong
    Zuo, Feilong
    Jiang, Yu
    Gao, Jian
    Jiao, Xun
    Sun, Jiaguang
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2019, 18 (05)
  • [8] Vulnerability-Oriented Fuzz Testing for Connected Autonomous Vehicle Systems
    Moukahal, Lama J.
    Zulkernine, Mohammad
    Soukup, Martin
    IEEE TRANSACTIONS ON RELIABILITY, 2021, 70 (04) : 1422 - 1437
  • [9] CSEFuzz: Fuzz Testing Based on Symbolic Execution
    Xie, Zhangwei
    Cui, Zhanqi
    Zhang, Jiaming
    Liu, Xiulei
    Zheng, Liwei
    IEEE ACCESS, 2020, 8 : 187564 - 187574
  • [10] An Automatic Fuzz Testing Method Designed for Detecting Vulnerabilities on All Protocol
    Huang, Bo
    Wen, Qiaoyan
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 639 - 642