2022
DOI: 10.1007/978-3-031-09234-3_18
|View full text |Cite
|
Sign up to set email alerts
|

IPSpex: Enabling Efficient Fuzzing via Specification Extraction on ICS Protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 23 publications
0
3
0
Order By: Relevance
“…(6) Count and store the final byte-relational array, R. Initialize the byte-relational array, R. If element J i in array J is greater than threshold 1, then the ith and i + 1th bytes do not belong to the same field, let r i = 1; otherwise, the ith and i + 1th bytes belong to the same field, let r i = 0. Add r i to array R. (7) Output the byte relation to array R. Initialize the array:…”
Section: Implementation Of Proprietary Protocol Structure Analysis Al...mentioning
confidence: 99%
See 2 more Smart Citations
“…(6) Count and store the final byte-relational array, R. Initialize the byte-relational array, R. If element J i in array J is greater than threshold 1, then the ith and i + 1th bytes do not belong to the same field, let r i = 1; otherwise, the ith and i + 1th bytes belong to the same field, let r i = 0. Add r i to array R. (7) Output the byte relation to array R. Initialize the array:…”
Section: Implementation Of Proprietary Protocol Structure Analysis Al...mentioning
confidence: 99%
“…(6) After decoding individual gene sequences, the byte mutation algorithm is used to mutate the decoded packet. (7) The generated test case is sent to the device through the Peach fuzzer. (8) The agent monitoring module of the Peach fuzzer is used to regularly monitor whether the device is abnormal.…”
Section: Implementation Of Fuzzing Test Case Generation Algorithm For...mentioning
confidence: 99%
See 1 more Smart Citation