工控协议安全研究综述

黄涛, 王郅伟, 刘家池, 龙千禧, 况博裕, 付安民… - 通信 …, 2024 - infocomm-journal.com
工控协议安全是保障ICS 稳定运行的关键, 大量工控协议在设计阶段忽视了对安全性的考量,
导致目前大部分主流工控协议普遍存在脆弱性问题. 结合ICS 架构和工控协议的发展特征 …

Research on Optimization of Fuzzing Test of Unknown Protocol Based on Message Type: Black Box Testing

WQ Fang, P Li, YJ Zhang, Y Chen - … Conference on Big Data and Security, 2021 - Springer
In recent years, due to the large number of unknown protocols, it is necessary to study the
security of unknown protocols. IFuzzing is a universal method that can be used to study …

Constructing Software Structure Graph through Progressive Execution

HR Lee, SH Shin, KH Choi, GH Jung… - Journal of The Korea …, 2013 - koreascience.kr
To verify software vulnerability, the method of conjecturing software structure and then
testing the software based on the conjectured structure has been highlighted. To utilize the …

A Tree-based Structure Mutation Method for Network Protocol Fuzzing

R Yang, J Jing, X Qi, H Zheng - ISCTT 2021; 6th International …, 2021 - ieeexplore.ieee.org
It is difficult to fuzz the protocol because the format of network protocol is complex and often
involves syntax and semantic constraints. Traditional fuzzing often makes a trade-off …

Trace model for cyclic behavior in wireless LANS.

S Bukhsh, S Abdullah, MN Asghar - Pakistan Journal of Science, 2018 - research.thea.ie
: For the estimation of cycle time in WLANs different parameters were used to analyze the
cyclic behavior like packet loss cycle, successful packet cycle and collision cycle. This paper …

차량ECU 의외부위협성가능성을검증하기위한테스트케이스생성연구

이혜련, 김경진, 정기현, 최경희 - 한국컴퓨터정보학회논문지, 2013 - dbpia.co.kr
차량에서 중요 기능들을 탑재하고 있는 ECU (Electric Control Unit) 들 간에 메시지를
주고받는데 하나의 내부 통신망 (CAN BUS) 으로 연결되어있으나, 이 네트워크는 외부에서 …

[引用][C] 基于污点分析的嵌入式设备固件模糊测试方法

戴忠华, 赵波, 王婷, 邹力 - 四川大学学报: 工程科学版, 2016

[引用][C] Research of generate a test case to verify the possibility of external threat of the automotive ECU

H Lee, K Kim, G Jung, K Choi - Journal of the …, 2013 - Korean Society of Computer …