{"title":"Security Analysis of Industrial Control S7 Protocol based on Peach","authors":"Quanjiang Shen, Liangliang Wang, Lei Zhang, Binbin Wang, Changjiang Liu, Ju-Wei Sha","doi":"10.1145/3589845.3589851","DOIUrl":null,"url":null,"abstract":"The normal operation of industrial control system (ICS) is the fundamental to ensure the stable production of industry. However, the existence of loopholes in ICS seriously threatens the normal operation of ICS. Fuzzy testing technology is one of the important technical means to find undisclosed vulnerabilities. This paper is based on the peach framework. Firstly, this paper excavates the vulnerabilities of HTTP protocol, and then this method is applied to the 0xf0 function code of industrial control S7 protocol. The results show that this method is effective in the vulnerability discovery of industrial control protocol.","PeriodicalId":302027,"journal":{"name":"Proceedings of the 2023 9th International Conference on Computing and Data Engineering","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 2023 9th International Conference on Computing and Data Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3589845.3589851","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The normal operation of industrial control system (ICS) is the fundamental to ensure the stable production of industry. However, the existence of loopholes in ICS seriously threatens the normal operation of ICS. Fuzzy testing technology is one of the important technical means to find undisclosed vulnerabilities. This paper is based on the peach framework. Firstly, this paper excavates the vulnerabilities of HTTP protocol, and then this method is applied to the 0xf0 function code of industrial control S7 protocol. The results show that this method is effective in the vulnerability discovery of industrial control protocol.