Citation Export
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Kim, Sung Jin | - |
dc.contributor.author | Cho, Jaeik | - |
dc.contributor.author | Lee, Changhoon | - |
dc.contributor.author | Shon, Taeshik | - |
dc.date.issued | 2020-12-01 | - |
dc.identifier.uri | https://dspace.ajou.ac.kr/dev/handle/2018.oak/31235 | - |
dc.description.abstract | Connections of cyber-physical system (CPS) components are gradually increasing owing to the introduction of the Industrial Internet of Things (IIoT). IIoT vulnerability analysis has become a major issue because complex skillful cyber-attacks on CPS systems exploit their zero-day vulnerabilities. However, current white box techniques for vulnerability analysis are difficult to use in real heterogeneous environments, where devices supplied by various manufacturers and diverse firmware versions are used. Therefore, we herein propose a novel protocol fuzzing test technique that can be applied in a heterogeneous environment. As seed configuration can significantly influence the test result in a black box test, we update the seed pool using test cases that travel different program paths compared to the seed. The input, output, and Delta times are used to determine if a new program area has been searched in the black box environment. We experimentally verified the effectiveness of the proposed. | - |
dc.description.sponsorship | This research was supported, in part, by the Basic Science Research Program (Grant No. 2018R1D1A1B07043349) and, in part, by the Energy Cloud R&D Program (Grant No. 2019M3F2A1073386), both through the National Research Foundation of Korea (NRF), funded by the Ministry of Science, ICT and Future Planning. | - |
dc.language.iso | eng | - |
dc.publisher | Springer | - |
dc.subject.mesh | Cyber-attacks | - |
dc.subject.mesh | Cyber-physical systems (CPS) | - |
dc.subject.mesh | Heterogeneous environments | - |
dc.subject.mesh | IIoT | - |
dc.subject.mesh | Seed selection | - |
dc.subject.mesh | Test techniques | - |
dc.subject.mesh | Vulnerability analysis | - |
dc.subject.mesh | Zero day vulnerabilities | - |
dc.title | Smart seed selection-based effective black box fuzzing for IIoT protocol | - |
dc.type | Article | - |
dc.citation.endPage | 10154 | - |
dc.citation.startPage | 10140 | - |
dc.citation.title | Journal of Supercomputing | - |
dc.citation.volume | 76 | - |
dc.identifier.bibliographicCitation | Journal of Supercomputing, Vol.76, pp.10140-10154 | - |
dc.identifier.doi | 10.1007/s11227-020-03245-7 | - |
dc.identifier.scopusid | 2-s2.0-85082751190 | - |
dc.identifier.url | http://www.springerlink.com/content/0920-8542 | - |
dc.subject.keyword | CPS | - |
dc.subject.keyword | Fuzzing test | - |
dc.subject.keyword | IIoT | - |
dc.subject.keyword | Vulnerability analysis | - |
dc.description.isoa | false | - |
dc.subject.subarea | Theoretical Computer Science | - |
dc.subject.subarea | Software | - |
dc.subject.subarea | Information Systems | - |
dc.subject.subarea | Hardware and Architecture | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.