SeqFuzzer: An industrial protocol fuzzing framework from a deep learning perspective

H Zhao, Z Li, H Wei, J Shi… - 2019 12th IEEE …, 2019 - ieeexplore.ieee.org
Industrial networks are the cornerstone of modern industrial control systems. Performing
security checks of industrial communication processes helps detect unknown risks and …

Ijon: Exploring deep state spaces via fuzzing

C Aschermann, S Schumilo, A Abbasi… - 2020 IEEE Symposium …, 2020 - ieeexplore.ieee.org
Although current fuzz testing (fuzzing) methods are highly effective, there are still many
situations such as complex state machines where fully automated approaches fail. State-of …

Learning-based fuzzing of IoT message brokers

BK Aichernig, E Muškardin… - 2021 14th IEEE …, 2021 - ieeexplore.ieee.org
The number of devices in the Internet of Things (IoT) immensely grew in recent years. A
frequent challenge in the assurance of the dependability of IoT systems is that components …

ATG: An attack traffic generation tool for security testing of in-vehicle CAN bus

T Huang, J Zhou, A Bytes - … of the 13th International Conference on …, 2018 - dl.acm.org
In-vehicle security research is challenging because it is hard for most researchers to get a
real vehicle for security evaluation. On the other hand, the existing software solutions are …

Violating assumptions with fuzzing

P Oehlert - IEEE Security & Privacy, 2005 - ieeexplore.ieee.org
Fuzzing is a highly automated testing technique that covers numerous boundary cases
using invalid data (from files, network protocols, API calls, and other targets) as application …

[PDF][PDF] PASTA: Portable automotive security testbed with adaptability

T Toyama, T Yoshida, H Oguma… - Proceedings of the Black …, 2018 - i.blackhat.com
For accelerating the development of sophisticated driving-assist technologies such as
automated driving, securing vehicles against cyberattacks is challenging. To promote the …

Intelligen: Automatic driver synthesis for fuzz testing

M Zhang, J Liu, F Ma, H Zhang… - 2021 IEEE/ACM 43rd …, 2021 - ieeexplore.ieee.org
Fuzzing is a technique widely used in vulnerability detection. The process usually involves
writing effective fuzz driver programs, which, when done manually, can be extremely labor …

Security-aware development of cyber-physical systems illustrated with automotive case study

V Izosimov, A Asvestopoulos… - … , Automation & Test …, 2016 - ieeexplore.ieee.org
We present a method for systematic consideration of security attributes in development of
cyber-physical systems. We evaluate our method in development of commercial vehicles …

[PDF][PDF] Cybersecurity evaluation of automotive e/e architectures

M Ring, D Frkat, M Schmiedecker - ACM Computer Science In …, 2018 - schmiedecker.net
The number of connectivity features of a modern car have expanded tremendously in recent
times, including convenience applications over local wireless networks and back-end …

Vulnerability Analysis of an Automotive Infotainment System's WIFI Capability

EFM Josephlal, S Adepu - 2019 IEEE 19th International …, 2019 - ieeexplore.ieee.org
Automobiles of the current era are heavily computerized which makes them highly
susceptible to attacks that were unheard of with traditional automobiles. In the past with …