2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE) 2019
DOI: 10.1109/ase.2019.00093
|View full text |Cite
|
Sign up to set email alerts
|

Learning-Guided Network Fuzzing for Testing Cyber-Physical System Defences

Abstract: The threat of attack faced by cyber-physical systems (CPSs), especially when they play a critical role in automating public infrastructure, has motivated research into a wide variety of attack defence mechanisms. Assessing their effectiveness is challenging, however, as realistic sets of attacks to test them against are not always available. In this paper, we propose smart fuzzing, an automated, machine learning guided technique for systematically finding 'test suites' of CPS network attacks, without requiring… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
57
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1

Relationship

1
6

Authors

Journals

citations
Cited by 50 publications
(60 citation statements)
references
References 53 publications
0
57
0
Order By: Relevance
“…Additionally, fuzzing approaches that specifically target CPS [21], [22], [41] cannot discover this kind of safety violations for two main reasons. First, policy violations are often triggered by the composition of different types of system inputs.…”
Section: Motivating Examplementioning
confidence: 99%
See 3 more Smart Citations
“…Additionally, fuzzing approaches that specifically target CPS [21], [22], [41] cannot discover this kind of safety violations for two main reasons. First, policy violations are often triggered by the composition of different types of system inputs.…”
Section: Motivating Examplementioning
confidence: 99%
“…Traditional fuzzing techniques [5], [44], [48] including those for CPS [21], [22], [41] have two main limitations that prevent their adoption for policy-guided fuzzing in real-world systems. First, their bug oracles are not designed to detect undesired system states that do not cause a system crash, memory-access violation, or physical instability.…”
Section: A Design Challengesmentioning
confidence: 99%
See 2 more Smart Citations
“…Control theoretic models (Kwon et al 2013) reduce the entire attack space to a mathematically tractable noise and abstract the physical aspects whereas the attacks designed in this paper are from a cyber physical attacker model (Adepu and Mathur 2016b) and affords an opportunity to widen the attack surface. The investigation of attacks (Kang et al 2016;Adepu et al 2020) and automatic generation of attacks (Chen et al 2019) have been studied.…”
Section: Related Workmentioning
confidence: 99%