An Iootfuzzer Method for Vulnerability Mining of Internet of Things Devices based on Binary Source Code and Feedback Fuzzing

被引:0
|
作者
Guo, Guangxin [1 ]
Wang, Chao [1 ]
Dong, Jiahan [1 ]
Li, Bowen [1 ]
Wang, Xiaohu [1 ]
机构
[1] State Grid Beijing Electric Power Research Institute, Beijing, China
关键词
Compilation and indexing terms; Copyright 2024 Elsevier Inc;
D O I
暂无
中图分类号
学科分类号
摘要
5G mobile communication systems - Codes (symbols) - Computer operating systems - Efficiency - Firmware - Mobile security - Network architecture - Network security - Personal computers - Security systems - Static analysis
引用
收藏
页码:692 / 697
相关论文
共 27 条
  • [1] An Iootfuzzer Method for Vulnerability Mining of Internet of Things Devices based on Binary Source Code and Feedback Fuzzing
    Guo, Guangxin
    Wang, Chao
    Dong, Jiahan
    Li, Bowen
    Wang, Xiaohu
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2022, 13 (07) : 692 - 697
  • [2] A Binary Code Vulnerability Mining Method Based on Generative Adversarial Networks
    Lai, Ji
    Li, Shuo
    Yao, Qigui
    [J]. ARTIFICIAL INTELLIGENCE AND SECURITY, ICAIS 2022, PT III, 2022, 13340 : 639 - 650
  • [3] Vulnerability mining method of SOAP based on black-box fuzzing
    Ding, Senyang
    Xu, Xianghua
    [J]. INTERNET TECHNOLOGY LETTERS, 2024,
  • [4] Method for Partial Recovering Source Code of Telecommunication Devices for Vulnerability Search
    Buinevich, Mikhail
    Izrailov, Konstantin
    Vladyko, Andrei
    [J]. 2015 17TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2015, : 76 - 80
  • [5] Mining Method of Code Vulnerability of Multi-Source Power IoT Terminal Based on Reinforcement Learning
    Yang, Hao
    Zhang, Junfeng
    Li, Jun
    Xie, Xin
    [J]. International Journal of Network Security, 2023, 25 (03) : 436 - 448
  • [6] Status-based Detection of malicious code in Internet of Things (IoT) devices
    Wei, Dongdi
    Qiu, Xiaofeng
    [J]. 2018 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2018,
  • [7] Vulnerability Mining Method Based on Code Property Graph and Attention BiLSTM
    Duan, Xu
    Wu, Jing-Zheng
    Luo, Tian-Yue
    Yang, Mu-Tian
    Wu, Yan-Jun
    [J]. Ruan Jian Xue Bao/Journal of Software, 2020, 31 (11): : 3404 - 3420
  • [8] Vulnerability-based risk assessment and mitigation strategies for edge devices in the Internet of Things
    George, Gemini
    Thampi, Sabu M.
    [J]. PERVASIVE AND MOBILE COMPUTING, 2019, 59
  • [9] An optimisation of mobile terminal data mining method based on internet of things
    Wang, Yi
    [J]. International Journal of Reasoning-based Intelligent Systems, 2024, 16 (01) : 58 - 65
  • [10] KFCM algorithm based on the source code mining method study
    Wang, Xun
    [J]. 2014 Fifth International Conference on Intelligent Systems Design and Engineering Applications (ISDEA), 2014, : 586 - 588