Modbus protocol vulnerability mining method based on dynamic taint analysis
A dynamic taint and vulnerability mining technology, applied in the direction of comprehensive factory control, data exchange through path configuration, digital transmission system, etc., can solve the problem of low efficiency of fuzzing testing, and achieve the effect of improving efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0042] The present invention will be further described below in conjunction with the accompanying drawings.
[0043] The invention relates to a dynamic taint analysis technology. By locating key fields in the Modbus protocol and combining with fuzzy testing technology, the efficiency of loophole mining for the Modbus protocol is effectively improved. The invention describes a Modbus protocol loophole mining method based on dynamic stain analysis. The purpose of the present invention is to solve the problem that the fuzzy testing efficiency is low at present, and use the dynamic taint analysis technology to design a kind of Modbus protocol key field location method, can make the test cases that the fuzzy testing generates more targeted, thereby improve the vulnerability mining efficiency.
[0044] 1. Data variation method of industrial control protocol:
[0045] The structure of the industrial control protocol usually includes the header of the protocol and the transmitted da...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


