Research on Network Protocol Vulnerability Discovery Based on Fuzz Testing

被引:0
|
作者
Li, Mingxuan [1 ]
He, Ling [1 ]
Teng, YangXin [1 ]
Wang, Xu [1 ]
Zhang, Jianye [2 ]
Qing, Song [2 ]
机构
[1] State Grid Xinjiang Elect Power Res Inst, Informat & Commun Technol Ctr, Urumqi, Peoples R China
[2] State Grid Xinjiang Elect Power Co, Urumqi, Peoples R China
关键词
network protocol vulnerability discovery; fuzz testing; heuristic test case generation; Peach;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Since the network application programs are developed rapidly, and the requirement of network protocol security is continually improved, the fuzz testing has become the research hotspot. On the basis of summarizing the current research direction, the identification method and test case generation of network protocol are researched emphatically. The heuristic fuzz testing framework based on parameter weight is proposed according to heuristic search algorithm and probability weights. The existing fuzz testing and vulnerability mining tool Peach is selected for extension, in which the heuristic input tracking technology based on parameter weight is adopted by the data generation module; IDAPRO is used to extract the function's heuristic factor to form the heuristic rules, and then the heuristic rules are used to guide the test case generation process; the transmission order of test cases is determined based on parameter weight. Finally, the commonly-used FTP protocol was verified with development tools. The test results verify that the heuristic fuzz testing framework based on parameter weight achieved the expected effect.
引用
收藏
页码:1354 / 1358
页数:5
相关论文
共 50 条
  • [41] Increasing Reliability of Programming Interfaces Based on Fuzz Testing
    Khortiuk, Yaroslav
    Kondratenko, Galyna
    Sidenko, Ievgen
    Kondratenko, Yuriy
    2020 IEEE 11TH INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS, SERVICES AND TECHNOLOGIES (DESSERT): IOT, BIG DATA AND AI FOR A SAFE & SECURE WORLD AND INDUSTRY 4.0, 2020, : 272 - 277
  • [42] Analysis and Research on Distributed Network Protocol Testing Controllability Problem
    Wang, Xiao
    Zhang, Jin Hua
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING FOR MECHANICS AND MATERIALS, 2015, 21 : 1163 - 1169
  • [43] Medical Information Research Based on Fuzz Integral
    Han, Yanan
    Song, Jinjie
    IEEE/SOLI'2008: PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON SERVICE OPERATIONS AND LOGISTICS, AND INFORMATICS, VOLS 1 AND 2, 2008, : 139 - +
  • [44] Fuzz Testing in Stack-Based Buffer Overflow
    Bhardwaj, Manisha
    Bawa, Seema
    ADVANCES IN COMPUTER COMMUNICATION AND COMPUTATIONAL SCIENCES, VOL 1, 2019, 759 : 23 - 36
  • [45] User Based Fault Detection, Vulnerability Discovery and Patching: An Interdisciplinary Research
    Kapur, P. K.
    2017 INTERNATIONAL CONFERENCE ON INFOCOM TECHNOLOGIES AND UNMANNED SYSTEMS (TRENDS AND FUTURE DIRECTIONS) (ICTUS), 2017, : 27 - 33
  • [46] Research on Software Vulnerability Testing Based on Function-Call
    Zeng, Fanping
    Chen, Minghui
    Yin, Kaitao
    Wang, Xufa
    2009 WRI INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND MOBILE COMPUTING: CMC 2009, VOL 3, 2009, : 564 - 568
  • [47] Fuzzing attacks for vulnerability discovery within MQTT protocol
    Casteur, G.
    Aubaret, A.
    Blondeau, B.
    Clouet, V.
    Quemat, A.
    Pical, V.
    Zitouni, R.
    2020 16TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC, 2020, : 420 - 425
  • [48] DoS Exploitation of Allen-Bradley's Legacy Protocol through Fuzz Testing
    Tacliad, Francisco
    Nguyen, Thuy D.
    Gondree, Mark
    3RD ANNUAL INDUSTRIAL CONTROL SYSTEM SECURITY WORKSHOP (ICSS 2017), 2017, : 24 - 31
  • [49] BaSFuzz: Fuzz testing based on difference analysis for seed bytes
    Lan, Wenwei
    Huang, Chen
    Yu, Tingting
    Li, Li
    Cui, Zhanqi
    JOURNAL OF SYSTEMS AND SOFTWARE, 2025, 222
  • [50] UEFI Fuzz Testing Method Based on Heuristic Reverse Analysis
    Lin, Xin-Kang
    Gu, Kuang-Yu
    Zhao, Lei
    Ruan Jian Xue Bao/Journal of Software, 2024, 35 (08): : 3577 - 3590