Paper
10 November 2022 Security analysis of power Internet of Things application based on guided fuzzy test
Zesheng Xi, Weiwei Miao, Zeng Zeng, Bo Zhang
Author Affiliations +
Proceedings Volume 12331, International Conference on Mechanisms and Robotics (ICMAR 2022); 1233136 (2022) https://doi.org/10.1117/12.2652284
Event: International Conference on Mechanisms and Robotics (ICMAR 2022), 2022, Zhuhai, China
Abstract
With the open sharing of power Internet of things, many IOT applications are in an uncontrollable environment, facing risks such as vulnerabilities/attacks and advanced sustainable threats. Through the software security detection before the application goes online to eliminate vulnerabilities, the resilience of IOT applications to threats can be greatly improved. However, the current software analysis methods have some problems, such as insufficient program coverage, high resource consumption, randomness of analysis results and so on. In view of the above problems, this paper studies the software security analysis method combining static and dynamic. Based on the control flow chart extracted by static analysis and combined with vulnerability potential evaluation, this paper generates the control flow chart with additional vulnerability prediction weight, so as to guide fuzzy testing to carry out dynamic analysis and improve the overall efficiency of fuzzy testing. Finally, a cross platform dynamic analysis architecture is proposed to improve the analysis efficiency by optimizing the intermediate language and code refactoring.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Zesheng Xi, Weiwei Miao, Zeng Zeng, and Bo Zhang "Security analysis of power Internet of Things application based on guided fuzzy test", Proc. SPIE 12331, International Conference on Mechanisms and Robotics (ICMAR 2022), 1233136 (10 November 2022); https://doi.org/10.1117/12.2652284
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Analytical research

Information security

Internet

Network security

Control systems

Binary data

Intelligence systems

Back to Top