Battling against Protocol Fuzzing: Protecting Networked Embedded Devices from Dynamic Fuzzers
Abstract
References
Index Terms
- Battling against Protocol Fuzzing: Protecting Networked Embedded Devices from Dynamic Fuzzers
Recommendations
Logos: Log Guided Fuzzing for Protocol Implementations
ISSTA 2024: Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and AnalysisNetwork protocols are extensively used in a variety of network devices, making the security of their implementations crucial. Protocol fuzzing has shown promise in uncovering vulnerabilities in these implementations. However traditional methods often ...
Fuzzing Framework for IEC 60870-5-104 Protocol
CSSE '22: Proceedings of the 5th International Conference on Computer Science and Software EngineeringThe importance of SCADA systems within the power grid is currently increasing due to the increased complexity of the grid. Thus, these systems may contain various security vulnerabilities, the exploitation of which may lead to large-scale blackouts. ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Funding Sources
- National Key R&D Program of Ministry of Science and Technology
- Natural Science Foundation of Beijing
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 621Total Downloads
- Downloads (Last 12 months)621
- Downloads (Last 6 weeks)54
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in