2020
DOI: 10.3390/app10114015
|View full text |Cite
|
Sign up to set email alerts
|

EWVHunter: Grey-Box Fuzzing with Knowledge Guide on Embedded Web Front-Ends

Abstract: At present, embedded devices have become a part of people’s lives, so detecting security vulnerabilities contained in devices becomes imperative. There are three challenges in detecting embedded device vulnerabilities: (1) Most network protocols are stateful; (2) the communication between the web front-end and the device is encrypted or encoded; and (3) the conditional constraints of programs in the device reduce the depth and breadth of fuzz testing. To address these challenges, we propose a new type of gray-… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 27 publications
0
7
0
Order By: Relevance
“…IoTHunter uses multi-level message generation mechanism to test the some standard protocols in IoT firmware, such as SNMP, FTP, BGP. Besides, Wang et al [17] presented EWV Hunter, a grey-box fuzzer for embedded IoT devices. EWV Hunter constructed a prior knowledge base about the web front-end and filled data at the input source.…”
Section: Generation-based Fuzzingmentioning
confidence: 99%
“…IoTHunter uses multi-level message generation mechanism to test the some standard protocols in IoT firmware, such as SNMP, FTP, BGP. Besides, Wang et al [17] presented EWV Hunter, a grey-box fuzzer for embedded IoT devices. EWV Hunter constructed a prior knowledge base about the web front-end and filled data at the input source.…”
Section: Generation-based Fuzzingmentioning
confidence: 99%
“…In the front-end fuzzing, the inputs are user operations, including GET requests, filling forms, and JS events. EWVHunter [14] implements web crawlers to interact with network applications which crawl the static resources from the front-end and explore input fields like URLs and forms. After filling randomly generated values in fields, EWVHunter clicks buttons to send mutated test cases and then checks the response message as well as the connection status to detect potential vulnerabilities.…”
Section: Iot Fuzzing Via Web Interfacementioning
confidence: 99%
“…However, writing templates requires full knowledge of the design of protocols. To this end, some works implement crawlers [10][11][12][13][14][15] to traverse the web application and capture the traffic messages. After that, customized strategies are applied to mutate these captured messages to generate test cases.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, "smart" fuzzer can produce testcases with lower blindness and randomness and higher efficiency. For example, Peach [6], BooFuzz [7] and AFLNET [8] are "smart" fuzzers. Taking BooFuzz to test the SMTP protocol for example, BooFuzz is a kind of "smart" fuzz testing framework.…”
Section: Previous Workmentioning
confidence: 99%