2021
DOI: 10.3390/app11073120
|View full text |Cite
|
Sign up to set email alerts
|

SIoTFuzzer: Fuzzing Web Interface in IoT Firmware via Stateful Message Generation

Abstract: Cyber attacks against the web management interface of Internet of Things (IoT) devices often have serious consequences. Current research uses fuzzing technologies to test the web interfaces of IoT devices. These IoT fuzzers generate messages (a test case sent from the client to the server to test its functionality) without considering their dependency, which is unlikely to bypass the early check of the server. These invalid test cases significantly reduce the efficiency of fuzzing. To overcome this problem, we… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 16 publications
(9 citation statements)
references
References 13 publications
0
8
0
1
Order By: Relevance
“…SIoTFuzzer [19] is another third-party independent work while writing this paper. SIoTFuzzer chooses to start from the Web front-end page and complete stateful message generation through front-end source code review, state analysis, and seed generation.…”
Section: Smart Devices Fuzzingmentioning
confidence: 99%
See 2 more Smart Citations
“…SIoTFuzzer [19] is another third-party independent work while writing this paper. SIoTFuzzer chooses to start from the Web front-end page and complete stateful message generation through front-end source code review, state analysis, and seed generation.…”
Section: Smart Devices Fuzzingmentioning
confidence: 99%
“…Fuzzing type Hardware support Component Zero-day detection IoTFuzzer [11] Black-box Bare-metal APP-related Yes FIRM-AFL [7] Grey-box Emulation Web Yes FirmFuzz [6] Grey-box Emulation Web Yes IoTHunter [17] Grey-box Emulation Protocol Yes MultiFuzz [18] Grey-box None Protocol Yes SIoTFuzzer [19] Black-box Emulation Web No DIANE [10] Black-box Bare-metal APP-related Yes device require authentication? (ii) Is the authentication process replayable?…”
Section: Fuzzermentioning
confidence: 99%
See 1 more Smart Citation
“…EWVHunter can automatically detect authentication bypass vulnerabilities and command injection vulnerabilities in embedded devices by using information from official firmware and logic programs that control the terminal's Web front-end. Reference [9] designed a black-box fuzzing tool named SIoTFuzzer, which can detect the vulnerabilities of IoT devices, design, and implement for automatic discovery of IoT devices' loopholes through device monitoring deployed in the system or built 2.4. Fuzzing Test Technology.…”
Section: Research On Routermentioning
confidence: 99%
“…FirmFuzz [10] and EWVHunter [14] implement web crawlers to maintain authenticated state, but intramessage and inter-message dependencies are often neglected. SIoTFuzzer [16] extracts messages between page responds to gain a stateful seed while not analyzing the intramessage dependencies in these messages.…”
Section: Introductionmentioning
confidence: 99%