Z-Fuzzer Article Swipe
Related Concepts
Fuzz testing
Computer science
Implementation
Protocol (science)
Vulnerability (computing)
Embedded system
Wireless Application Protocol
Computer network
Wireless
Link Control Protocol
Internet of Things
Task (project management)
The Internet
Cryptographic protocol
Internet protocol suite
Computer security
Wireless network
Software
Operating system
Cryptography
User Datagram Protocol
Engineering
Software engineering
Pathology
Systems engineering
Alternative medicine
Medicine
Mengfei Ren
,
Xiaolei Ren
,
Huadong Feng
,
Jiang Ming
,
Yu Lei
·
YOU?
·
· 2021
· Open Access
·
· DOI: https://doi.org/10.1145/3448300.3468296
· OA: W3173646574
YOU?
·
· 2021
· Open Access
·
· DOI: https://doi.org/10.1145/3448300.3468296
· OA: W3173646574
With the proliferation of the Internet of Things (IoT) devices, Zigbee is widely adopted as a resource-efficient wireless protocol. Recently, severe vulnerabilities in Zigbee protocol implementations have compromised IoT devices from different manufacturers. It becomes imperative to perform security testing on Zigbee protocol implementations. However, it is not a trivial task to apply the existing vulnerability detection techniques such as fuzzing to Zigbee protocol implementations. In particular, it remains a significant obstacle to deal with low-level hardware events. Many existing protocol fuzzing tools lack a proper execution environment for the Zigbee protocol, which communicates via a radio channel instead of the Internet.
Related Topics
Finding more related topics…