Structuring the Space to Optimize the Testing Environment and Results

2021 ◽  
pp. 70-74
Author(s):  
Christine S. Ghilain
Keyword(s):  
Cybersecurity ◽  
2021 ◽  
Vol 4 (1) ◽  
Author(s):  
Yu Zhang ◽  
Wei Huo ◽  
Kunpeng Jian ◽  
Ji Shi ◽  
Longquan Liu ◽  
...  

AbstractSOHO (small office/home office) routers provide services for end devices to connect to the Internet, playing an important role in cyberspace. Unfortunately, security vulnerabilities pervasively exist in these routers, especially in the web server modules, greatly endangering end users. To discover these vulnerabilities, fuzzing web server modules of SOHO routers is the most popular solution. However, its effectiveness is limited due to the lack of input specification, lack of routers’ internal running states, and lack of testing environment recovery mechanisms. Moreover, existing works for device fuzzing are more likely to detect memory corruption vulnerabilities.In this paper, we propose a solution ESRFuzzer to address these issues. It is a fully automated fuzzing framework for testing physical SOHO devices. It continuously and effectively generates test cases by leveraging two input semantic models, i.e., KEY-VALUE data model and CONF-READ communication model, and automatically recovers the testing environment with power management. It also coordinates diversified mutation rules with multiple monitoring mechanisms to trigger multi-type vulnerabilities. With the guidance of the two semantic models, ESRFuzzer can work in two ways: general mode fuzzing and D-CONF mode fuzzing. General mode fuzzing can discover both issues which occur in the CONF and READ operation, while D-CONF mode fuzzing focus on the READ-op issues especially missed by general mode fuzzing.We ran ESRFuzzer on 10 popular routers across five vendors. In total, it discovered 136 unique issues, 120 of which have been confirmed as 0-day vulnerabilities we found. As an improvement of SRFuzzer, ESRFuzzer have discovered 35 previous undiscovered READ-op issues that belong to three vulnerability types, and 23 of them have been confirmed as 0-day vulnerabilities by vendors. The experimental results show that ESRFuzzer outperforms state-of-the-art solutions in terms of types and number of vulnerabilities found.


Author(s):  
P. Nardini ◽  
M. Chen ◽  
R. Bujack ◽  
M. Bottinger ◽  
G. Scheuermann
Keyword(s):  

2013 ◽  
Vol 68 ◽  
pp. 440-457 ◽  
Author(s):  
Ricardo Conejo ◽  
Beatriz Barros ◽  
Eduardo Guzmán ◽  
Juan-Ignacio Garcia-Viñas

2016 ◽  
Vol 24 (9) ◽  
pp. 1757-1773 ◽  
Author(s):  
Lorenzo Sallese ◽  
Niccolò Grossi ◽  
Antonio Scippa ◽  
Gianni Campatelli

Among the chatter suppression techniques in milling, active fixtures seem to be the most industrially oriented, mainly because these devices could be directly retrofittable to a variety of machine tools. The actual performances strongly depend on fixture design and the control logic employed. The usual approach in the literature, derived from general active vibration control applications, is based on the employment of adaptive closed-loop controls aimed at mitigating the amplitude of chatter frequencies with targeted counteracting vibrations. Whilst this approach has proven its effectiveness, a general application would demand a wide actuation bandwidth that is practically impeded by inertial forces and actuator-related issues. This paper presents the study of the performance of alternative open-loop actuation strategies in suppressing chatter phenomena, aiming at limiting the required actuation bandwidth. A dedicated time-domain simulation model, integrating fixture dynamics and the features of piezoelectric actuators, is developed and experimentally validated in order to be used as a testing environment to assess the effectiveness of the proposed actuation strategies. An extensive numerical investigation is then carried out to highlight the most influential factors in assessing the capability of suppressing chatter vibrations. The results clearly demonstrated that the regenerative effect could be effectively disrupted by actuation frequencies close to half the tooth-pass frequency, as long as adequate displacement is provided by the actuators. This could sensibly increase the critical axial depth of cut and hence improve the achievable material removal rate, as discussed in the paper.


2018 ◽  
Vol 8 (1) ◽  
pp. 80-92
Author(s):  
Matej Madeja ◽  
Jaroslav Porubän

Abstract This paper describes the design of a testing environment for massive assessment of assignments for Android application programming courses. Specific testing methods and tool suggestions are continuously consulted with Wirecard company, dedicated to the development of mobile applications. The paper also analyzes the most common mistakes of students and suggests ways to uncover them through tests. Based on these, it creates tests, compares the performance of the emulator and real device tests, and the proposed tools are partially retrospectively tested on assignments from the previous run of a particular Android application programming course. From partial results the paper suggests changes for the course in relation to the testing environment and deploys it in the background of the course alongside the manual evaluation. It describes testing experience, analyzes the results and suggests changes for the future


2018 ◽  
Vol 291 ◽  
pp. 128-135 ◽  
Author(s):  
Mihael Cudic ◽  
Ryan Burt ◽  
Eder Santana ◽  
Jose C. Principe

2013 ◽  
Vol 712-715 ◽  
pp. 1923-1927
Author(s):  
Zhang Fan ◽  
Dong Yu Yang ◽  
Lin Jun ◽  
Chun Hui Yang

This paper discusses the design, implementation and analysis of a system analysis for wireless sensor network. Current testing systems have low efficiency on software environment. We proposed a service oriented software approach, and gave out an experimental analysis of reliability. The testing system greatly decreases the development workload on server. Experiment reveals that the result of reliability analysis is accurate and the testing system is effective.


Sign in / Sign up

Export Citation Format

Share Document