2018
DOI: 10.3390/sym10110561
|View full text |Cite
|
Sign up to set email alerts
|

IoT Application-Layer Protocol Vulnerability Detection using Reverse Engineering

Abstract: Fuzzing is regarded as the most promising method for protocol vulnerabilities discovering in network security of Internet of Things (IoT). However, one fatal drawback of existing fuzzing methods is that a huge number of test files are required to maintain a high test coverage. In this paper, a novel method based on protocol reverse engineering is proposed to reduce the amount of test files for fuzzing. The proposed method uses techniques in the field of protocol reverse engineering to identify message formats … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(4 citation statements)
references
References 41 publications
0
4
0
Order By: Relevance
“…Therefore, consuming considerable amount of time. Luo et al [17], proposed a technique that performs reverse engineering of IoT protocols, to identify the message format of [18] verified the effectiveness graph-based analysis on a smart home system prototype. The prototype consisted of a smartphone controlling a smart light pulp and a Google home speaker.…”
Section: Detecting Iot Network Vulnerabilitiesmentioning
confidence: 98%
“…Therefore, consuming considerable amount of time. Luo et al [17], proposed a technique that performs reverse engineering of IoT protocols, to identify the message format of [18] verified the effectiveness graph-based analysis on a smart home system prototype. The prototype consisted of a smartphone controlling a smart light pulp and a Google home speaker.…”
Section: Detecting Iot Network Vulnerabilitiesmentioning
confidence: 98%
“…Numerous attempts have been made to reverse the formats of messages sent by a network application, which is crucial for information security of IoT [8,9]. Studies undertaken for this purpose focus on (1) approaches based on network traces [10] and (2) approaches based on execution traces [11].…”
Section: Related Workmentioning
confidence: 99%
“…All of the aforementioned issues can be mitigated or avoided altogether with effective testing mechanisms for pub/sub brokers. In that regard, one of the most ideal and necessary testing techniques for pub/sub protocols is fuzzing (Luo et al, 2018;Praveen et al, 2023), which consists in generating and sending random inputs to a message broker. The output of the broker is then analyzed for potential weaknesses.…”
Section: Introductionmentioning
confidence: 99%
“…Third, it can mitigate implementation issues and zero-day attacks. These benefits are reasons why fuzz testing is considered the primary bug-finding technique for most software applications (Munea, Lim, et al, 2016;Munea, Luk Kim, et al, 2017;Luo et al, 2018;Boehme et al, 2021;Vinzenz and Oka, 2021).…”
Section: Introductionmentioning
confidence: 99%