%0 Conference Proceedings %T Identifying Vulnerabilities in SCADA Systems via Fuzz-Testing %+ Dartmouth College [Hanover] %+ University of Illinois [Chicago] (UIC) %A Shapiro, Rebecca %A Bratus, Sergey %A Rogers, Edmond %A Smith, Sean %Z Part 2: CONTROL SYSTEMS SECURITY %< avec comité de lecture %( IFIP Advances in Information and Communication Technology %B 5th International Conference Critical Infrastructure Protection (ICCIP) %C Hanover, NH, United States %Y Jonathan Butts %Y Sujeet Shenoi %I Springer %3 Critical Infrastructure Protection V %V AICT-367 %P 57-72 %8 2011-03-23 %D 2011 %R 10.1007/978-3-642-24864-1_5 %K Vulnerability assessment %K SCADA systems %K fuzz-testing %Z Computer Science [cs]Conference papers %X Security vulnerabilities typically arise from bugs in input validation and in the application logic. Fuzz-testing is a popular security evaluation technique in which hostile inputs are crafted and passed to the target software in order to reveal bugs. However, in the case of SCADA systems, the use of proprietary protocols makes it difficult to apply existing fuzz-testing techniques as they work best when the protocol semantics are known, targets can be instrumented and large network traces are available. This paper describes a fuzz-testing solution involving LZFuzz, an inline tool that provides a domain expert with the ability to effectively fuzz SCADA devices. %G English %Z TC 11 %Z WG 11.10 %2 https://inria.hal.science/hal-01571775/document %2 https://inria.hal.science/hal-01571775/file/978-3-642-24864-1_5_Chapter.pdf %L hal-01571775 %U https://inria.hal.science/hal-01571775 %~ IFIP %~ IFIP-AICT %~ IFIP-TC %~ IFIP-TC11 %~ IFIP-ICCIP %~ IFIP-WG11-10 %~ IFIP-AICT-367