E-mail

E-mail a Wiley Online Library Link

Huan Yang, Yuqing Zhang, Yu-pu Hu and Qi-xu Liu IKE vulnerability discovery based on fuzzing Security and Communication Networks 6

Article first published online: 7 NOV 2012 | DOI: 10.1002/sec.628

Thumbnail image of graphical abstract

This paper summarizes the most comprehensive vulnerable points of the Internet key exchange (IKE) protocol and designed a two-stage test cases library based on fuzzing. This approach reduces the blindness of other traditional fuzzing approaches. Additionally, we design and implement an IKE protocol vulnerability discovering tool called IKEProFuzzer. It is a network protocol fuzzing framework with extensibility and automatic Monitor/Debugger designed by ourselves. In the experiments, the tool has discovered 14 vulnerabilities, including nine released vulnerabilities and five unreleased ones.

Complete the form below and we will send an e-mail message containing a link to the selected article on your behalf

Required = Required Field

SEARCH