EWVHunter: Grey-Box Fuzzing with Knowledge Guide on Embedded Web Front-Ends

At present, embedded devices have become a part of people’s lives, so detecting security vulnerabilities contained in devices becomes imperative. There are three challenges in detecting embedded device vulnerabilities: (1) Most network protocols are stateful; (2) the communication between the web fr...

Full description

Bibliographic Details
Main Authors: Enze Wang, Baosheng Wang, Wei Xie, Zhenhua Wang, Zhenhao Luo, Tai Yue
Format: Article
Language:English
Published: MDPI AG 2020-06-01
Series:Applied Sciences
Subjects:
Online Access:https://www.mdpi.com/2076-3417/10/11/4015