Although current fuzz testing (fuzzing) methods are highly effective, there are still many situations such as complex state machines where fully automated approaches fail. State-of …
The number of devices in the Internet of Things (IoT) immensely grew in recent years. A frequent challenge in the assurance of the dependability of IoT systems is that components …
T Huang, J Zhou, A Bytes - … of the 13th International Conference on …, 2018 - dl.acm.org
In-vehicle security research is challenging because it is hard for most researchers to get a real vehicle for security evaluation. On the other hand, the existing software solutions are …
P Oehlert - IEEE Security & Privacy, 2005 - ieeexplore.ieee.org
Fuzzing is a highly automated testing technique that covers numerous boundary cases using invalid data (from files, network protocols, API calls, and other targets) as application …
T Toyama, T Yoshida, H Oguma… - Proceedings of the Black …, 2018 - i.blackhat.com
For accelerating the development of sophisticated driving-assist technologies such as automated driving, securing vehicles against cyberattacks is challenging. To promote the …
M Zhang, J Liu, F Ma, H Zhang… - 2021 IEEE/ACM 43rd …, 2021 - ieeexplore.ieee.org
Fuzzing is a technique widely used in vulnerability detection. The process usually involves writing effective fuzz driver programs, which, when done manually, can be extremely labor …
V Izosimov, A Asvestopoulos… - … , Automation & Test …, 2016 - ieeexplore.ieee.org
We present a method for systematic consideration of security attributes in development of cyber-physical systems. We evaluate our method in development of commercial vehicles …
M Ring, D Frkat, M Schmiedecker - ACM Computer Science In …, 2018 - schmiedecker.net
The number of connectivity features of a modern car have expanded tremendously in recent times, including convenience applications over local wireless networks and back-end …
EFM Josephlal, S Adepu - 2019 IEEE 19th International …, 2019 - ieeexplore.ieee.org
Automobiles of the current era are heavily computerized which makes them highly susceptible to attacks that were unheard of with traditional automobiles. In the past with …