2021 14th IEEE Conference on Software Testing, Verification and Validation (ICST) 2021
DOI: 10.1109/icst49551.2021.00017
|View full text |Cite
|
Sign up to set email alerts
|

Learning-Based Fuzzing of IoT Message Brokers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1
1

Relationship

2
5

Authors

Journals

citations
Cited by 20 publications
(9 citation statements)
references
References 24 publications
0
9
0
Order By: Relevance
“…AALpy has been successfully used to learn the protocols of MQTT and Bluetooth. These learned models serve as a basis for learningbased testing [3] and fuzzing [5].…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…AALpy has been successfully used to learn the protocols of MQTT and Bluetooth. These learned models serve as a basis for learningbased testing [3] and fuzzing [5].…”
Section: Discussionmentioning
confidence: 99%
“…We particularly focus on learning models of reactive systems, whose input-output behavior under appropriate abstraction can be captured by regular languages. Learning models of such systems in the MAT framework lends itself nicely to a test-based implementation, as demonstrated in various case studies [5,11,30,35]. Algorithms in this framework alternate between two phases.…”
Section: Aalpy -Intuitive Automata Learning In Pythonmentioning
confidence: 97%
See 2 more Smart Citations
“…However, this app :1" oach ne � ds a white-box component inside the SUT to y1eld sensible test cases. In order to overcome this, there is an approach that uses abstract automata leaming to leam an abstract model of the SUT, and performs conformance testing on the SUT using fuzzing techniques for concretizing the test input [15]. On the other hand, models can be subjected to a symbolic model checker, which is an already elaborated field [16], that would yield attacks for components that could also serve as a basis for an attack graph.…”
Section: Displays An Example Model With Matched Vulnerabilities In Th...mentioning
confidence: 99%