Ajou University repository

Field classification-based novel fuzzing case generation for ICS protocols
Citations

SCOPUS

18

Citation Export

DC Field Value Language
dc.contributor.authorKim, Sung Jin-
dc.contributor.authorShon, Taeshik-
dc.date.issued2018-09-01-
dc.identifier.urihttps://dspace.ajou.ac.kr/dev/handle/2018.oak/29981-
dc.description.abstractAn industrial control system combined with IT is not a special thing; however, cyber security in this field does not mature. Therefore, vulnerability analysis techniques for protocols used in this field are clearly needed. In this paper, we propose a novel test case generation technique for a fuzzing test that can be used for various industrial control system protocols. The proposed fuzzing test is designed for generating a cross-field fuzzing test case because of field dependencies, a characteristic of industrial control system protocols. Additionally, we focus on multilayer testing because the weaknesses of lower layer protocols are inherited by upper layer protocols.-
dc.description.sponsorshipThis work was supported by the Power Generation and Electricity Delivery Core Technology Program of Korea Institute of Energy Technology Evaluation and Planning (KETEP) granted financial resource from the Ministry of Trade, Industry, and Energy, Republic of Korea (no. 20131020402090) and MSIP (Ministry of Science, ICT, and Future Planning), Korea, under the ITRC (Information Technology Research Center) support program (IITP-2016-R0992-16-1006) supervised by the IITP (Institute for Information & communications Technology Promotion). This work was supported by the Power Generation and Electricity Delivery Core Technology Program of Korea Institute of Energy Technology Evaluation and Planning (KETEP) granted financial resource from the Ministry of Trade, Industry, and Energy, Republic of Korea (no. 20131020402090) and MSIP(Ministry of Science, ICT, and Future Planning), Korea, under the ITRC(Information Technology Research Center) support program (IITP-2016-R0992-16-1006) supervised by the IITP (Institute for Information & communications Technology Promotion).-
dc.description.sponsorshipAcknowledgements This work was supported by the Power Generation and Electricity Delivery Core Technology Program of Korea Institute of Energy Technology Evaluation and Planning (KETEP) granted financial resource from the Ministry of Trade, Industry, and Energy, Republic of Korea (no. 20131020402090) and MSIP (Ministry of Science, ICT, and Future Planning), Korea, under the ITRC (Information Technology Research Center) support program (IITP-2016-R0992-16-1006) supervised by the IITP (Institute for Information & communications Technology Promotion).-
dc.description.sponsorshipThis work was supported by the Power Generation and Electricity Delivery Core Technology Program of Korea Institute of Energy Technology Evaluation and Planning (KETEP) granted financial resource from the Ministry of Trade, Industry, and Energy, Republic of Korea (no. 20131020402090) and MSIP(Ministry of Science, ICT, and Future Planning), Korea, under the ITRC(Information Technology Research Center) support program (IITP-2016-R0992-16-1006) supervised by the IITP (Institute for Information & communications Technology Promotion).-
dc.language.isoeng-
dc.publisherSpringer New York LLC-
dc.subject.meshField test-
dc.subject.meshFuzzing tests-
dc.subject.meshIndustrial control systems-
dc.subject.meshTest case generation-
dc.subject.meshVulnerability analysis-
dc.titleField classification-based novel fuzzing case generation for ICS protocols-
dc.typeArticle-
dc.citation.endPage4450-
dc.citation.startPage4434-
dc.citation.titleJournal of Supercomputing-
dc.citation.volume74-
dc.identifier.bibliographicCitationJournal of Supercomputing, Vol.74, pp.4434-4450-
dc.identifier.doi10.1007/s11227-017-1980-3-
dc.identifier.scopusid2-s2.0-85012892498-
dc.identifier.urlhttp://www.springerlink.com/content/0920-8542-
dc.subject.keywordCross-field test-
dc.subject.keywordFuzzing test-
dc.subject.keywordIndustrial control system protocol-
dc.subject.keywordTest case generation-
dc.subject.keywordVulnerability analysis-
dc.description.isoafalse-
dc.subject.subareaSoftware-
dc.subject.subareaTheoretical Computer Science-
dc.subject.subareaInformation Systems-
dc.subject.subareaHardware and Architecture-
Show simple item record

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

SHON, TAE SHIK Image
SHON, TAE SHIK손태식
Department of Cyber Security
Read More

Total Views & Downloads

File Download

  • There are no files associated with this item.