2019
DOI: 10.3390/s19153362
|View full text |Cite
|
Sign up to set email alerts
|

Automated Vulnerability Discovery and Exploitation in the Internet of Things

Abstract: Recently, automated software vulnerability detection and exploitation in Internet of Things (IoT) has attracted more and more attention, due to IoT’s fast adoption and high social impact. However, the task is challenging and the solutions are non-trivial: the existing methods have limited effectiveness at discovering vulnerabilities capable of compromising IoT systems. To address this, we propose an Automated Vulnerability Discovery and Exploitation framework with a Scheduling strategy, AutoDES that aims to im… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(12 citation statements)
references
References 48 publications
0
12
0
Order By: Relevance
“…Their approach is based on a brute-force process to generate messages automatically and a mutation-based algorithm to generate structure valid messages. Fuzzing testing is also considered in Reference [186] to discover new vulnerabilities by mutating test cases that represent a valid attack path for a vulnerability. Moreover, in Reference [123], different CoAP implementations are tested through several fuzzing testing techniques by modeling a CoAP packet.…”
Section: Security Testing: Analysis and Applicability To The Iot Contextmentioning
confidence: 99%
“…Their approach is based on a brute-force process to generate messages automatically and a mutation-based algorithm to generate structure valid messages. Fuzzing testing is also considered in Reference [186] to discover new vulnerabilities by mutating test cases that represent a valid attack path for a vulnerability. Moreover, in Reference [123], different CoAP implementations are tested through several fuzzing testing techniques by modeling a CoAP packet.…”
Section: Security Testing: Analysis and Applicability To The Iot Contextmentioning
confidence: 99%
“…Ref. [29] analyze the characteristics of vulnerabilities and then propose to generate EXPs via the use of several proposed attack techniques that can produce a shell based on the detected vulnerabilities.…”
Section: Automatic Exploit Generationmentioning
confidence: 99%
“…Therefore, a significant problem is determining how to produce sufficient testinputs. As mentioned in Section IV, there are two approaches in the test-input generation for fuzzers: a mutation-based approach which produces test-inputs according to the random mutation of the test-input files, or the use of predefined L Intriguer [140] L [141] AutoDES [142] L SHFuzz [143] L HFL [144] L FIoT [145] L BugMiner [146] L…”
Section: B Test-input Generationmentioning
confidence: 99%
“…al. [125] VUzzer [50] DeepFuzzer [107] Intriguer [140] Colossus [128] DigFuzz [119] Munch [133] SAFL [106] QSYM [64] Cyberdyne [72] Tinker [132] SHFuzz [143] SAVIOR [66] Wildfire [92] IoT Patching Kernel Java SAVIOR [63] FIoT [145] RedQueen [111] AutoDES [142] SynFuzz [127] DeepDiver [65] This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication.…”
Section: Hfs In Various Areasmentioning
confidence: 99%
See 1 more Smart Citation