Coverage Guided Fuzzing of Remote Embedded Devices
- 提供方法
- 本サイト上にてダウンロード・閲覧可
- 形態
- 価格
- 一般価格(税込):¥1,100 会員価格(税込):¥880
- 文献番号
- 20225167
- 文献・情報種別
- 学術講演会予稿集(春)
No.37-22
- 掲載ページ
- 1-4(Total 4 p)
- 発行年月
- 2022年 5月
- 出版社
- (公社)自動車技術会
- 言語
- 英語
- イベント
- 2022年春季大会
書誌事項
著者(英) | 1) David Lazar, 2) Chiharu Ota |
---|---|
勤務先(英) | 1) Argus Cyber Security, 2) Argus Cyber Security |
抄録(英) | The most common method of coverage-guided binary fuzzing involves running the binary in an emulated environment. Aside that an emulator should exist for the target CPU architecture, this requires a simulation of all the hardware peripherals that don't exist in the emulated environment. This task is complicated and time consuming. We suggest an innovative approach to perform coverage-guided fuzzing without the need of an emulation. This approach may provide vehicle manufacturers an automated way to test all of their embedded ECU software components when searching for software vulnerabilities, even if the source code for these is not available. 翻訳 |