Design of fuzzing test tool based on WIA-PA protocol
نویسندگان
چکیده
منابع مشابه
A Multi-Path DSDV-Based Routing Protocol for WIA-PA Network
WIA-PA is a kind of wireless network for industrial process automation, which has a high requirement for the real-time and reliability of the data transmission. Based on the deficiency of the existing routing protocols, this paper puts forward a new kind of WIA-PA routing protocol MWD. The protocol chooses the stablest link in the routing table as the optimal route, and then based on the node d...
متن کاملTool - Supported Test Case Design Based on Z andthe
This extended abstract describes an approach for generating test cases from Z speciications. The approach combines the classiication-tree method with the disjunctive normal form approach as follows: A classiication-tree is constructed from the formal speciication and the resulting high level test cases are transformed into reened test cases by generating disjunctive normal form for them. Furthe...
متن کاملImproving Protocol State Fuzzing of SSH
With the scale and use of the Internet nowadays, it is crucial that we can effectively test the correctness and security of systems that handle our personal data. In this thesis, we improve upon a previous work by Verleg. Verleg used protocol state fuzzing to test several implementations of the SSH protocol. By adapting a more formal methodology, we achieve higher confidence in our results. We ...
متن کاملProtocol State Fuzzing of TLS Implementations
We describe a largely automated and systematic analysis of TLS implementations by what we call ‘protocol state fuzzing’: we use state machine learning to infer state machines from protocol implementations, using only blackbox testing, and then inspect the inferred state machines to look for spurious behaviour which might be an indication of flaws in the program logic. For detecting the presence...
متن کاملstudy of hash functions based on chaotic maps
توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...
ذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Physics: Conference Series
سال: 2021
ISSN: 1742-6588,1742-6596
DOI: 10.1088/1742-6596/1856/1/012046