References
- F. Linder, "Routing and tunneling protocol attacks," in Proc. of BlackHat briefings, Amsterdam, Holland, November, 2001.
- M. Lynn, "The holy grail: Cisco IOS shellcode and exploitation techniques," in Proc. of BlackHat, Las Vegas, USA. July, 2005.
- A. Pilosov and T. Kapela, "Stealing the internet: An internet-scale man in the middle attack," in Defcon 16, Las Vegas, USA, August, 2008.
- Gyan Chawdhary and Varun Uppal, "Cisco IOS shellcode," in Proc. of BlackHat, Las Vecas, USA, August, 2008.
- Groundworks technologies, dynamips gdb server mod project, http://www.groundworkstech.com/projects/dynamipsgdb-mod, June-December, 2011.
- National Vulnerability Database, http://nvd.nist.gov/, June-December, 2011.
- Felix Lindner, "Cisco vulnerabilities-yesterday, today and tomorrow," in Proc. of BlackHat, Virginia, USA, September 29-October 2, 2007.
- Felix Linder, "Cisco IOS attack and defense the state of art," in Proc. of 25th Chaos Communication Congress (25C3), Berlin, Germany, December, 2009.
- Felix Linder, "Cisco IOS router exploitation," in BlackHat, Las Vecas, USA, July, 2009.
- A. Cui, J. Kataria and S.J. Stolfo, "Killing the myth of Cisco IOS diversity," in Proc. of USENIX Worshop on Offensive Technologies, San Francisco, CA, USA, August, 2011.
- S. Muniz and A. Ortega, "Fuzzing and debugging Cisco IOS," in Proc. of BlackHat, Barcelona, Spain, March, 2011.
- B.P. Miller, L. Fredriksen and B. So, "An empirical study of the reliability of unix utilities," Communications of the ACM, 33(12):32-44, 1990. https://doi.org/10.1145/96267.96279
- P. Oehlert, "Violating assumptions with fuzzing," Security & Privacy, IEEE, 3(2):58-62, 2005.
- Ai-Fen Sui, Wen Tang, Jian Jun Hu and Ming Zhu Li, "An effective fuzz input generation method for protocol testing," in Proc. of IEEE 13th International Conference on Communication Technology (ICCT), pages 728-731, IEEE, September, 2011.
- X. Zhu, Z. Wu and J.W. Atwood. "A new fuzzing method using multi data samples combination," Journal of Computers, 6(5):881-888, 2011.
- Z. Wu, J.W. Atwood and X. Zhu, "A new fuzzing technique for software vulnerability mining," in Proc. of the IEEE CONSEG, Chennai, India, December, 2009.
- SPIKE, http://www.immunityinc.com/resourcesfreesoftware.shtml, June, 2010-November, 2011.
- PEACH, http://peachfuzzer.com/, June, 2010-November, 2011.
- Sulley, http://code.google.com/p/sulley/, June, 2010-November, 2011.
- AutoDafe, http://autodafe.sourceforge.net/, June, 2010-November, 2011.
- GPF, http://www.vdalabs.com/tools/efs gpf.html, June, 2010-November, 2011.
- M. Sutton, A. Greene and P. Amini, Fuzzing: brute force vulnerabilty discovery, 1st Edition, Addison-Wesley Professional, New Jersey, 2007.
- B. ZHANG, C. ZHANG, and Y. XU, "Network protocol vulnerability discovery based on fuzzy testing," Journal of Tsinghua University (Science and Technology), pages S2, 51-56, 2009.
- G. Banks, M.Cova, V.Felmetsger, K.Almeroth, R.Kemmerer and G.Vigna, "Snooze: toward a stateful network protocol fuzzer," Information Security, pages 343-358, 2006.
- Common Vulnerabilities and Exposures, http://cve.mitre.org/, June-December, 2011.
- Qixu Liu and Yuqing Zhang, "TFTP vulnerability finding technique based on fuzzing," Computer Communications, 31(14):3420-3426, 2008. https://doi.org/10.1016/j.comcom.2008.05.041
- GDB, The GNU Project Debugger, http://sources.redhat.com/gdb/, June-December, 2011.
- IDA, http://www.hexrays.com/products/ida/index.shtml, June-December, 2011.
- J.Case, M.Fedor, M.Schoffstall and J.Davin, RFC 1157: A Simple Network Management Protocol (SNMP), 1990.
- SNMPv2 Working Group et al, RFC 1902: Structure of management information for version 2 of the simple network management protocol (SNMPv2), 1996.
- R.Mundy, D.Partain and B.Stewart, "Introduction to SNMPv3," Technical report, RFC 2570, April, 1999.
- O.Tal, S.Knight and T.Dean, "Syntax-based vulnerability testing of frame-based network protocols," in Proc. of 2nd Annual Conference on Privacy, Security and Trust, pages 155-160. Citeseer, 2004.
Cited by
- Resetting Your Password Is Vulnerable: A Security Study of Common SMS-Based Authentication in IoT Device vol.2018, pp.None, 2013, https://doi.org/10.1155/2018/7849065
- Discovering Vulnerabilities in COTS IoT Devices through Blackbox Fuzzing Web Management Interface vol.2019, pp.None, 2019, https://doi.org/10.1155/2019/5076324
- Automated Vulnerability Discovery and Exploitation in the Internet of Things vol.19, pp.15, 2013, https://doi.org/10.3390/s19153362
- SVTester: Finding DoS Vulnerabilities of Virtual Switches vol.29, pp.None, 2013, https://doi.org/10.2197/ipsjjip.29.581
- GNFCVulFinder: NDEF Vulnerability Discovering for NFC-Enabled Smart Mobile Devices Based on Fuzzing vol.2021, pp.None, 2013, https://doi.org/10.1155/2021/9946022