Research on Network Protocol Vulnerability Discovery Based on Fuzz Testing

被引:0
|
作者
Li, Mingxuan [1 ]
He, Ling [1 ]
Teng, YangXin [1 ]
Wang, Xu [1 ]
Zhang, Jianye [2 ]
Qing, Song [2 ]
机构
[1] State Grid Xinjiang Elect Power Res Inst, Informat & Commun Technol Ctr, Urumqi, Peoples R China
[2] State Grid Xinjiang Elect Power Co, Urumqi, Peoples R China
关键词
network protocol vulnerability discovery; fuzz testing; heuristic test case generation; Peach;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Since the network application programs are developed rapidly, and the requirement of network protocol security is continually improved, the fuzz testing has become the research hotspot. On the basis of summarizing the current research direction, the identification method and test case generation of network protocol are researched emphatically. The heuristic fuzz testing framework based on parameter weight is proposed according to heuristic search algorithm and probability weights. The existing fuzz testing and vulnerability mining tool Peach is selected for extension, in which the heuristic input tracking technology based on parameter weight is adopted by the data generation module; IDAPRO is used to extract the function's heuristic factor to form the heuristic rules, and then the heuristic rules are used to guide the test case generation process; the transmission order of test cases is determined based on parameter weight. Finally, the commonly-used FTP protocol was verified with development tools. The test results verify that the heuristic fuzz testing framework based on parameter weight achieved the expected effect.
引用
收藏
页码:1354 / 1358
页数:5
相关论文
共 50 条
  • [21] A Rapid Review on Fuzz Security Testing for Software Protocol Implementations
    Marchetto, Alessandro
    TESTING SOFTWARE AND SYSTEMS, ICTSS 2023, 2023, 14131 : 3 - 20
  • [22] Vulnerability-Oriented Fuzz Testing for Connected Autonomous Vehicle Systems
    Moukahal, Lama J.
    Zulkernine, Mohammad
    Soukup, Martin
    IEEE TRANSACTIONS ON RELIABILITY, 2021, 70 (04) : 1422 - 1437
  • [23] FormalFuzzer: Formal Verification Assisted Fuzz Testing for SoC Vulnerability Detection
    Dipu, Nusrat Farzana
    Hossain, Muhammad Monir
    Azar, Kimia Zamiri
    Farahmandi, Farimah
    Tehranipoor, Mark
    29TH ASIA AND SOUTH PACIFIC DESIGN AUTOMATION CONFERENCE, ASP-DAC 2024, 2024, : 355 - 361
  • [24] Detection of LTE protocol Based on Format Fuzz
    Cui, Baojiang
    Feng, Shengbo
    Xiao, Qinshu
    Li, Ming
    2015 10TH INTERNATIONAL CONFERENCE ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA 2015), 2015, : 187 - 192
  • [25] An Efficient Smart Contracts Event Ordering Vulnerability Detection System Based on Symbolic Execution and Fuzz Testing
    Li, Yitao
    Cui, Baojiang
    Wang, Dongbin
    Yu, Yue
    Zhang, Can
    INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS 2024, 2024, 214 : 280 - 287
  • [26] Research on Network Topology Discovery Algorithm for Internet of Things based on Multi-protocol
    Zhou, Shaopeng
    Cui, Lingguo
    Fang, Chen
    Chai, Senchun
    PROCEEDINGS OF 2018 10TH INTERNATIONAL CONFERENCE ON MODELLING, IDENTIFICATION AND CONTROL (ICMIC), 2018,
  • [27] SoCFuzzer: SoC Vulnerability Detection using Cost Function enabled Fuzz Testing
    Hossain, Muhammad Monir
    Vafaei, Arash
    Azar, Kimia Zamiri
    Rahman, Fahim
    Farahmandi, Farimah
    Tehranipoor, Mark
    2023 DESIGN, AUTOMATION & TEST IN EUROPE CONFERENCE & EXHIBITION, DATE, 2023,
  • [28] Green-Fuzz: Efficient Fuzzing for Network Protocol Implementations
    Andarzian, Seyed Behnam
    Daniele, Cristian
    Poll, Erik
    FOUNDATIONS AND PRACTICE OF SECURITY, PT I, FPS 2023, 2024, 14551 : 253 - 268
  • [29] Improving Security Testing with Usage-Based Fuzz Testing
    Schneider, Martin A.
    Herbold, Steffen
    Wendland, Marc-Florian
    Grabowski, Jens
    RISK ASSESSMENT AND RISK-DRIVEN TESTING, 2015, 9488 : 110 - 119
  • [30] CSEFuzz: Fuzz Testing Based on Symbolic Execution
    Xie, Zhangwei
    Cui, Zhanqi
    Zhang, Jiaming
    Liu, Xiulei
    Zheng, Liwei
    IEEE ACCESS, 2020, 8 : 187564 - 187574