2020
DOI: 10.1109/access.2020.3023250
|View full text |Cite
|
Sign up to set email alerts
|

CPFuzz: Combining Fuzzing and Falsification of Cyber-Physical Systems

Abstract: Coverage-guided grey-box fuzzing for computer systems has been explored for decades. However, existing techniques do not adequately explore the space of continuous behaviors in Cyber-Physical Systems (CPSs), which may miss safety-critical bugs. Optimization-guided falsification is promising to find violations of safety specifications, but not suitable for identifying traditional program bugs. This article presents a fuzzing process for finding safety violations at the development phase, which is guided by two … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 34 publications
0
1
0
Order By: Relevance
“…The industrial control system depends on standard protocols like the TCP/IP and ICCP, which makes the industrial control system insecure due to insecure protocols. The TCP/IP's vulnerabilities have been inspected in [131], [132], but this protocol still has security concerns as it is not anticipated to be secure via the design. Indeed, the remote procedure call (RPC) protocol has security vulnerabilities, although it contributed to the renowned Stuxnet attack [133].…”
Section: The Cyber Vulnerabilities In the Industrial Control Systementioning
confidence: 99%
“…The industrial control system depends on standard protocols like the TCP/IP and ICCP, which makes the industrial control system insecure due to insecure protocols. The TCP/IP's vulnerabilities have been inspected in [131], [132], but this protocol still has security concerns as it is not anticipated to be secure via the design. Indeed, the remote procedure call (RPC) protocol has security vulnerabilities, although it contributed to the renowned Stuxnet attack [133].…”
Section: The Cyber Vulnerabilities In the Industrial Control Systementioning
confidence: 99%