Unlock instant, AI-driven research and patent intelligence for your innovation.

Modbus protocol vulnerability mining method based on dynamic taint analysis

A dynamic taint and vulnerability mining technology, applied in the direction of comprehensive factory control, data exchange through path configuration, digital transmission system, etc., can solve the problem of low efficiency of fuzzing testing, and achieve the effect of improving efficiency

Active Publication Date: 2021-07-27
HARBIN ENG UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the present invention is to solve the problem that the fuzzy test efficiency is low at present, and a kind of Modbus protocol loophole mining method based on dynamic taint analysis is provided

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Modbus protocol vulnerability mining method based on dynamic taint analysis
  • Modbus protocol vulnerability mining method based on dynamic taint analysis
  • Modbus protocol vulnerability mining method based on dynamic taint analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The present invention will be further described below in conjunction with the accompanying drawings.

[0043] The invention relates to a dynamic taint analysis technology. By locating key fields in the Modbus protocol and combining with fuzzy testing technology, the efficiency of loophole mining for the Modbus protocol is effectively improved. The invention describes a Modbus protocol loophole mining method based on dynamic stain analysis. The purpose of the present invention is to solve the problem that the fuzzy testing efficiency is low at present, and use the dynamic taint analysis technology to design a kind of Modbus protocol key field location method, can make the test cases that the fuzzy testing generates more targeted, thereby improve the vulnerability mining efficiency.

[0044] 1. Data variation method of industrial control protocol:

[0045] The structure of the industrial control protocol usually includes the header of the protocol and the transmitted da...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of dynamic taint analysis, and particularly relates to a Modbus protocol vulnerability mining method based on dynamic taint analysis. The Modbus protocol vulnerability mining method solves the problem that current fuzzy testing is low in efficiency, designs a Modbus protocol key field positioning method by using a dynamic stain analysis technology, positions a key field in a Modbus protocold, and combines a fuzzy testing technology, so that the test case generated by fuzzy testing is more targeted, and the efficiency of vulnerability mining for the Modbus protocol is effectively improved.

Description

technical field [0001] The invention belongs to the technical field of dynamic stain analysis, and in particular relates to a method for mining Modbus protocol loopholes based on dynamic stain analysis. Background technique [0002] Since the communication protocol of the industrial control system is only based on the use requirements at the beginning, the security of the protocol has not been designed too much. security protection has been greatly threatened. At the same time, fuzz testing technology, which is widely used to mine industrial control protocol vulnerabilities, currently has three problems: blind generation of test cases, insufficient complexity of data mutation methods, and low code coverage, which will lead to low efficiency of fuzz testing. Contents of the invention [0003] The purpose of the present invention is to solve the problem of low fuzzy testing efficiency at present, and provide a Modbus protocol loophole mining method based on dynamic stain an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/26H04L12/40
CPCH04L63/1433H04L63/1441H04L43/18H04L12/40H04L2012/40228Y02P90/02
Inventor 田健彤
Owner HARBIN ENG UNIV