Identifying Vulnerabilities in SCADA Systems via Fuzz-Testing

Abstract : Security vulnerabilities typically arise from bugs in input validation and in the application logic. Fuzz-testing is a popular security evaluation technique in which hostile inputs are crafted and passed to the target software in order to reveal bugs. However, in the case of SCADA systems, the use of proprietary protocols makes it difficult to apply existing fuzz-testing techniques as they work best when the protocol semantics are known, targets can be instrumented and large network traces are available. This paper describes a fuzz-testing solution involving LZFuzz, an inline tool that provides a domain expert with the ability to effectively fuzz SCADA devices.
Document type :
Conference papers
Jonathan Butts; Sujeet Shenoi. 5th International Conference Critical Infrastructure Protection (ICCIP), Mar 2011, Hanover, NH, United States. Springer, IFIP Advances in Information and Communication Technology, AICT-367, pp.57-72, 2011, Critical Infrastructure Protection V. 〈10.1007/978-3-642-24864-1_5〉
Liste complète des métadonnées

Cited literature [22 references]  Display  Hide  Download

https://hal.inria.fr/hal-01571775
Contributor : Hal Ifip <>
Submitted on : Thursday, August 3, 2017 - 3:03:54 PM
Last modification on : Thursday, November 23, 2017 - 3:34:02 PM

File

978-3-642-24864-1_5_Chapter.pd...
Files produced by the author(s)

Licence


Distributed under a Creative Commons Attribution 4.0 International License

Identifiers

Citation

Rebecca Shapiro, Sergey Bratus, Edmond Rogers, Sean Smith. Identifying Vulnerabilities in SCADA Systems via Fuzz-Testing. Jonathan Butts; Sujeet Shenoi. 5th International Conference Critical Infrastructure Protection (ICCIP), Mar 2011, Hanover, NH, United States. Springer, IFIP Advances in Information and Communication Technology, AICT-367, pp.57-72, 2011, Critical Infrastructure Protection V. 〈10.1007/978-3-642-24864-1_5〉. 〈hal-01571775〉

Share

Metrics

Record views

168

Files downloads

130