4.5 Article

IoT Application-Layer Protocol Vulnerability Detection using Reverse Engineering

Journal

SYMMETRY-BASEL
Volume 10, Issue 11, Pages -

Publisher

MDPI
DOI: 10.3390/sym10110561

Keywords

vulnerability detection; IoT security; change-point detection; protocol reverse engineering

Funding

  1. National Natural Science Foundation of China [61702120, 61571141]
  2. Natural Science Foundation of Guangdong Province [2017A030310591, 2014A030313637, 2015A030313672]
  3. Department of Education of Guangdong Province [YQ2015105, 2016GCZX006, 2016KQNCX091]
  4. Guangdong Provincial Application-oriented Technical Research and Development Special fund project [2015B010131017]
  5. Guangdong Science and Technology Department [2016A010120010, 2014A010103032, 2017A090905023]
  6. Science and Technology Program of Guangzhou [201604016108]

Ask authors/readers for more resources

Fuzzing is regarded as the most promising method for protocol vulnerabilities discovering in network security of Internet of Things (IoT). However, one fatal drawback of existing fuzzing methods is that a huge number of test files are required to maintain a high test coverage. In this paper, a novel method based on protocol reverse engineering is proposed to reduce the amount of test files for fuzzing. The proposed method uses techniques in the field of protocol reverse engineering to identify message formats of IoT application-layer protocol and create test files by generating messages with error fields according to message formats. The protocol message treated as a sequence of bytes is assumed to obey a statistic process with change-points indicating the boundaries of message fields. Then, a multi-change-point detection procedure is introduced to identify change-points of byte sequences according to their statistic properties and divide them into segments according to their change-points. The message segments are further processed via a position-based occurrence probability test analysis to identify keyword fields, data fields and uncertain fields. Finally, a message generation procedure with mutation operation on message fields is applied to construct test files for fuzzing test. The results show that the proposed method can effectively find out the message fields and significantly reduce the amount of test files for fuzzing test.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available