• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

物联网中的自动化漏洞发现与利用

Automated Vulnerability Discovery and Exploitation in the Internet of Things.

作者信息

Wang Zhongru, Zhang Yuntao, Tian Zhihong, Ruan Qiang, Liu Tong, Wang Haichen, Liu Zhehui, Lin Jiayi, Fang Binxing, Shi Wei

机构信息

Key Laboratory of Trustworthy Distributed Computing and Service (Beijing University of Posts and Telecommunications), Ministry of Education, Beijing 100876, China.

Cyberspace Institute of Advanced Technology, Guangzhou University, Guangzhou 510006, China.

出版信息

Sensors (Basel). 2019 Jul 31;19(15):3362. doi: 10.3390/s19153362.

DOI:10.3390/s19153362
PMID:31370171
原文链接:https://pmc.ncbi.nlm.nih.gov/articles/PMC6696294/
Abstract

Recently, automated software vulnerability detection and exploitation in (IoT) has attracted more and more attention, due to IoT's fast adoption and high social impact. However, the task is challenging and the solutions are non-trivial: the existing methods have limited effectiveness at discovering vulnerabilities capable of compromising IoT systems. To address this, we propose an Automated Vulnerability Discovery and Exploitation framework with a Scheduling strategy, that aims to improve the efficiency and effectiveness of vulnerability discovery and exploitation. In the vulnerability discovery stage, we use our technique to mitigate the "path explosion" problem. This approach first generates a specific input proceeding from symbolic execution based on a (CFG). It then leverages a mutation-based fuzzer to find vulnerabilities while avoiding invalid mutations. In the vulnerability exploitation stage, we analyze the characteristics of vulnerabilities and then propose to generate exploits, via the use of several proposed attack techniques that can produce a shell based on the detected vulnerabilities. We also propose a genetic algorithm (GA)-based scheduling strategy (AutoS) that helps with assigning the computing resources dynamically and efficiently. The extensive experimental results on the RHG 2018 challenge dataset and the BCTF-RHG 2019 challenge dataset clearly demonstrate the effectiveness and efficiency of the proposed framework.

摘要

近年来,由于物联网(IoT)的快速普及及其巨大的社会影响,自动化软件漏洞检测与利用在物联网领域越来越受到关注。然而,这项任务具有挑战性,解决方案也并非易事:现有方法在发现能够危及物联网系统的漏洞方面效果有限。为解决这一问题,我们提出了一种带有调度策略的自动化漏洞发现与利用框架,旨在提高漏洞发现与利用的效率和效果。在漏洞发现阶段,我们使用我们的技术来缓解“路径爆炸”问题。该方法首先基于控制流图(CFG)从符号执行生成特定输入。然后利用基于变异的模糊测试器来查找漏洞,同时避免无效变异。在漏洞利用阶段,我们分析漏洞特征,然后通过使用几种提出的攻击技术来生成利用程序,这些技术可以基于检测到的漏洞生成一个外壳。我们还提出了一种基于遗传算法(GA)的调度策略(AutoS),它有助于动态高效地分配计算资源。在RHG 2018挑战数据集和BCTF - RHG 2019挑战数据集上的大量实验结果清楚地证明了所提出框架的有效性和效率。

相似文献

1
Automated Vulnerability Discovery and Exploitation in the Internet of Things.物联网中的自动化漏洞发现与利用
Sensors (Basel). 2019 Jul 31;19(15):3362. doi: 10.3390/s19153362.
2
Enhancing Security of Web-Based IoT Services via XSS Vulnerability Detection.通过跨站脚本攻击漏洞检测增强基于Web的物联网服务安全性
Sensors (Basel). 2023 Nov 25;23(23):9407. doi: 10.3390/s23239407.
3
The Presence, Trends, and Causes of Security Vulnerabilities in Operating Systems of IoT's Low-End Devices.物联网低端设备操作系统安全漏洞的存在、趋势和原因。
Sensors (Basel). 2021 Mar 26;21(7):2329. doi: 10.3390/s21072329.
4
An Improved Vulnerability Exploitation Prediction Model with Novel Cost Function and Custom Trained Word Vector Embedding.具有新型代价函数和自定义训练词向量嵌入的改进型漏洞利用预测模型。
Sensors (Basel). 2021 Jun 20;21(12):4220. doi: 10.3390/s21124220.
5
A vulnerability detection method for IoT protocol based on parallel fuzzy algorithm.一种基于并行模糊算法的物联网协议漏洞检测方法。
Heliyon. 2024 May 29;10(12):e31846. doi: 10.1016/j.heliyon.2024.e31846. eCollection 2024 Jun 30.
6
Vulnerability extraction and prediction method based on improved information gain algorithm.基于改进信息增益算法的漏洞提取与预测方法。
PLoS One. 2024 Sep 10;19(9):e0309809. doi: 10.1371/journal.pone.0309809. eCollection 2024.
7
Towards a Safer Internet of Things-A Survey of IoT Vulnerability Data Sources.迈向更安全的物联网——物联网漏洞数据源综述
Sensors (Basel). 2020 Oct 22;20(21):5969. doi: 10.3390/s20215969.
8
Teaching and Learning IoT Cybersecurity andVulnerability Assessment with Shodan through Practical Use Cases.通过实际用例教授和学习物联网网络安全和漏洞评估以及 Shodan 的使用。
Sensors (Basel). 2020 May 27;20(11):3048. doi: 10.3390/s20113048.
9
Named-Entity-Recognition-Based Automated System for Diagnosing Cybersecurity Situations in IoT Networks.基于命名实体识别的物联网网络网络安全态势诊断自动化系统。
Sensors (Basel). 2019 Aug 1;19(15):3380. doi: 10.3390/s19153380.
10
A Methodological Approach for Assessing Amplified Reflection Distributed Denial of Service on the Internet of Things.一种评估物联网上放大反射分布式拒绝服务攻击的方法学途径。
Sensors (Basel). 2016 Nov 4;16(11):1855. doi: 10.3390/s16111855.

引用本文的文献

1
A Review of IoT Firmware Vulnerabilities and Auditing Techniques.物联网固件漏洞与审计技术综述
Sensors (Basel). 2024 Jan 22;24(2):708. doi: 10.3390/s24020708.