Enhancing Boofuzz Process Monitoring for Closed-Source SCADA System Fuzzing

Patrick Cousineau, Brian Lachine
{"title":"Enhancing Boofuzz Process Monitoring for Closed-Source SCADA System Fuzzing","authors":"Patrick Cousineau, Brian Lachine","doi":"10.1109/SysCon53073.2023.10131048","DOIUrl":null,"url":null,"abstract":"Past cyber-attacks have demonstrated that Industrial Control and SCADA Systems are high-value targets for modern threat actors. In order to defend these classes of systems, it is necessary to detect and eliminate any pre-existing vulnerabilities before they can be leveraged into zero-day exploits. Different methods exist to find exploitable vulnerabilities in the software that runs these systems, one of which is known as fuzzing – wherein a system under test is exposed to a variety of input streams while simultaneously observed for unexpected behaviours, exceptions, or crashes. The aim of this research is to extend the Boofuzz network protocol-based fuzzing framework in order to effectively monitor a closed-source SCADA HMI endpoint during fuzz testing. Effective monitoring in this context is defined as the automated detection of target crashes during fuzzing which are recorded with an exception description, reproducing steps, and call stack trace. This data minimizes the time required for vulnerabilities discovered during fuzzing to be reproduced, investigated, and rectified by the software vendor. In order to accomplish this aim, our SCADA HMI is first analyzed to identify the fuzzing target and its runtime behaviours. A protocol fuzzer is then custom built for it using Boofuzz, with the existing target process monitor class extended to introduce new log file and debugger-based monitors. These extensions are then tested through fuzz tests of the SCADA HMI, the results from which demonstrate that vulnerabilities can be both automatically detected and recorded with the sufficient level of detail to expedite rectification.","PeriodicalId":169296,"journal":{"name":"2023 IEEE International Systems Conference (SysCon)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE International Systems Conference (SysCon)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SysCon53073.2023.10131048","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Past cyber-attacks have demonstrated that Industrial Control and SCADA Systems are high-value targets for modern threat actors. In order to defend these classes of systems, it is necessary to detect and eliminate any pre-existing vulnerabilities before they can be leveraged into zero-day exploits. Different methods exist to find exploitable vulnerabilities in the software that runs these systems, one of which is known as fuzzing – wherein a system under test is exposed to a variety of input streams while simultaneously observed for unexpected behaviours, exceptions, or crashes. The aim of this research is to extend the Boofuzz network protocol-based fuzzing framework in order to effectively monitor a closed-source SCADA HMI endpoint during fuzz testing. Effective monitoring in this context is defined as the automated detection of target crashes during fuzzing which are recorded with an exception description, reproducing steps, and call stack trace. This data minimizes the time required for vulnerabilities discovered during fuzzing to be reproduced, investigated, and rectified by the software vendor. In order to accomplish this aim, our SCADA HMI is first analyzed to identify the fuzzing target and its runtime behaviours. A protocol fuzzer is then custom built for it using Boofuzz, with the existing target process monitor class extended to introduce new log file and debugger-based monitors. These extensions are then tested through fuzz tests of the SCADA HMI, the results from which demonstrate that vulnerabilities can be both automatically detected and recorded with the sufficient level of detail to expedite rectification.
在闭源SCADA系统模糊测试中增强Boofuzz过程监控
过去的网络攻击表明,工业控制和SCADA系统是现代威胁行为者的高价值目标。为了保护这类系统,有必要在它们被利用为零日漏洞之前检测并消除任何预先存在的漏洞。存在不同的方法来发现运行这些系统的软件中的可利用漏洞,其中一种被称为模糊测试——在测试系统暴露于各种输入流的同时观察意外行为、异常或崩溃。本研究的目的是扩展基于Boofuzz网络协议的模糊测试框架,以便在模糊测试期间有效地监控闭源SCADA HMI端点。在此上下文中,有效监控被定义为在模糊测试期间自动检测目标崩溃,并记录异常描述、重现步骤和调用堆栈跟踪。这些数据最大限度地减少了软件供应商重现、调查和纠正在模糊测试期间发现的漏洞所需的时间。为了实现这一目标,首先对我们的SCADA HMI进行分析,以确定模糊目标及其运行时行为。然后使用Boofuzz为它定制一个协议模糊器,并扩展现有的目标进程监视器类,以引入新的日志文件和基于调试器的监视器。然后通过SCADA HMI的模糊测试对这些扩展进行测试,结果表明可以自动检测和记录漏洞,并提供足够的详细信息以加快纠正。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信