期刊文献+

基于Sulley改进的工控协议模糊测试架构设计 被引量:2

The design of fuzzing architecture for industry control protocols based on Sulley
下载PDF
导出
摘要 模糊测试(Fuzzing)可以有效发现协议漏洞。然而不同于网络协议,工控协议模糊测试具有协议种类众多、私有协议解析难等特点。对此,文章转换问题解决思路,从工控工程师的角度入手,解析了Sulley的模糊测试架构和流程,设计了基于Sulley改进的工控协议模糊测试架构,采用基于块的可视化拖拽式界面进行私有协议的数据构造,公有协议采用套件的形式进行导入,添加输入优化模块以适应于工控系统,该框架有助于解决工控协议模糊测试中易用性差、测试负载大、测试效率低的问题。 Fuzzing can detect protocol vulnerabilities effectively. Different from network protocols,the industry control protocols are various and it is difficult to get the regulation of private industry control protocols. Therefore,the resolution is proposed by converting the subject of fuzzing test from testers to industry engineers. Firstly,fuzzing architecture and testing process of Sulley are analyzed. Based on that,an improved fuzzing architecture for industry control protocols is designed. In the new architecture,block-based visual interfaces are used for building private protocols. Public industry control protocols are tested by importing test suite. Besides,an optimization module to reduce testing data input is added into the architecture for the purpose of adjusting to industry devices. This architecture is meaningful to resolve problems of industry control protocols fuzzing including poor usability,large testing load and low efficiency.
出处 《微型机与应用》 2017年第19期3-5,共3页 Microcomputer & Its Applications
关键词 模糊测试 工控协议 Sulley uzzing industry control protocols Sulley
  • 相关文献

参考文献5

二级参考文献45

  • 1邵林,张小松,苏恩标.一种基于fuzzing技术的漏洞发掘新思路[J].计算机应用研究,2009,26(3):1086-1088. 被引量:17
  • 2张宝峰,张翀斌,许源.基于模糊测试的网络协议漏洞挖掘[J].清华大学学报(自然科学版),2009(S2):2113-2118. 被引量:14
  • 3姜明宇,马文丽,郑文岭.基于遗传算法的基因表达数据的K-均值聚类分析[J].上海生物医学工程,2006,27(3):151-154. 被引量:4
  • 4吴世忠.信息安全测评认证的十年求索[J].信息安全与通信保密,2007,29(6):5-8. 被引量:9
  • 5彭青白.缓冲区溢出漏洞的挖掘与利用方法研究[D].武汉:华中科技大学,2009.
  • 6Nagappan N, Ball T. Static analysis tools as early indicators of pre- release defect density[M]. New York: ACM, 2005.
  • 7Wang T, Wei T, Gu G,et al. TaintScope: A checksum-aware directed fuzzing fool for automatic software vulnerability detection[C]. In: Proc. of the IEEE Security & Privacy 2010: Oakland.
  • 8Merwe J, Caceres R, Chu Y. H, Sreenan C. A Tool for Monitoring Internet Multimedia Traffic[C]. ACM Computer Communication Review, Oct. 2000, vol.30:48-59.
  • 9Bush W, Pincus J, Sielaff D. A static analyzer for finding dynamic programming errors[J]. Software-Practice and Experience, 2000, 30(7): 775-802.
  • 10Kurt Tutschku. A Measurement-Based Traffic Profile of the eDonkey Filesharing Service[C]. PAM,2004:12-21.

共引文献45

同被引文献20

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部