Next Article in Journal
E-DNet: An End-to-End Dual-Branch Network for Driver Steering Intention Detection
Next Article in Special Issue
Advanced Comparative Analysis of Machine Learning and Transformer Models for Depression and Suicide Detection in Social Media Texts
Previous Article in Journal
A Comprehensive Review of dc/ac Single-Phase Differential-Mode Inverters for Low-Power Applications
Previous Article in Special Issue
Interpretability and Transparency of Machine Learning in File Fragment Analysis with Explainable Artificial Intelligence
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

StructuredFuzzer: Fuzzing Structured Text-Based Control Logic Applications

1
Department of Computer Science, University of Idaho, 1776 Science Center Dr suite 304, Idaho Falls, ID 83402, USA
2
Department of Information Security and Communication Technology, Norwegian University of Science and Technology, 2802 Gjøvik, Norway
3
Idaho National Laboratory, Idaho Falls, ID 83415, USA
*
Author to whom correspondence should be addressed.
Electronics 2024, 13(13), 2475; https://doi.org/10.3390/electronics13132475
Submission received: 11 May 2024 / Revised: 31 May 2024 / Accepted: 15 June 2024 / Published: 25 June 2024
(This article belongs to the Special Issue Information Retrieval and Cyber Forensics with Data Science)

Abstract

:
Rigorous testing methods are essential for ensuring the security and reliability of industrial controller software. Fuzzing, a technique that automatically discovers software bugs, has also proven effective in finding software vulnerabilities. Unsurprisingly, fuzzing has been applied to a wide range of platforms, including programmable logic controllers (PLCs). However, current approaches, such as coverage-guided evolutionary fuzzing implemented in the popular fuzzer American Fuzzy Lop Plus Plus (AFL++), are often inadequate for finding logical errors and bugs in PLC control logic applications. They primarily target generic programming languages like C/C++, Java, and Python, and do not consider the unique characteristics and behaviors of PLCs, which are often programmed using specialized programming languages like Structured Text (ST). Furthermore, these fuzzers are ill suited to deal with complex input structures encapsulated in ST, as they are not specifically designed to generate appropriate input sequences. This renders the application of traditional fuzzing techniques less efficient on these platforms. To address this issue, this paper presents a fuzzing framework designed explicitly for PLC software to discover logic bugs in applications written in ST specified by the IEC 61131-3 standard. The proposed framework incorporates a custom-tailored PLC runtime and a fuzzer designed for the purpose. We demonstrate its effectiveness by fuzzing a collection of ST programs that were crafted for evaluation purposes. We compare the performance against a popular fuzzer, namely, AFL++. The proposed fuzzing framework demonstrated its capabilities in our experiments, successfully detecting logic bugs in the tested PLC control logic applications written in ST. On average, it was at least 83 times faster than AFL++, and in certain cases, for example, it was more than 23,000 times faster.

1. Introduction

Industrial control systems (ICSs) include special devices such as supervisory control and data acquisition (SCADA) systems, distributed control systems (DCSs), and programmable logic controllers (PLCs) [1], and are designed to monitor and control processes in critical infrastructures such as power plants, water treatment facilities, and oil refineries [2]. Focusing on PLC devices as enablers of operational technology (OT) [1], these devices were designed to support the automation of many processes in ICS with programs written in languages such as Structured Text (ST), ladder logic (LL), Sequential Function Chart (SFC), and Function Block Diagram (FBD) [3]. However, these programming languages are not widely used outside the ICS domain. As a result, the critical process of secure programming is often overlooked, leaving such critical devices vulnerable to logical errors. This, in turn, can lead to disastrous consequences. For example, in 2015, the Ukrainian power grid was attacked by the advanced persistent threat (APT) group known as Sandworm, using malware to shut down power to 225,000 customers [4]. In 2017, the Triton malware was used to attack a petrochemical plant in Saudi Arabia [5]. Again, in 2021, the US Cybersecurity and Infrastructure Security Agency (CISA) issued an alert warning regarding the fact that some attackers had gained remote access to a water treatment facility in Florida and attempted to poison the water supply [6].
The industry responded to such threats by increasing the security against external threats targeting PLCs [7]. However, ensuring the security of PLCs is not solely about defending against external attacks; it also involves rigorous testing down to the application level, i.e., the control logic, to prevent internal errors leading to attacks or catastrophic failures. In this direction, developing and implementing advanced fuzzing techniques for PLCs, which can uncover security vulnerabilities and logical errors, is an essential step to enhance the overall security capacity of ICSs.
Fuzzing, or fuzz testing, is an automated software testing technique that provides unexpected or invalid input to a target program to reveal some unintended behavior [8]. Put simply, the primary objective of a fuzzer is to uncover bugs and other errors in software, including security vulnerabilities. Fuzzing has been widely used to find vulnerabilities in various software programs, including web browsers, operating systems, and network protocols [9]. Fuzzing techniques may prove vitally important for enhancing cybersecurity in ICS. An effective fuzzing approach for ICS aids in identifying and rectifying vulnerabilities, thus contributing to the overall fortification of critical infrastructure and ensuring operational continuity in numerous industries. Although conventional fuzzing techniques have yielded significant results for common software systems, their effectiveness is substantially reduced when applied to PLCs due to their distinct and complex architecture. In fact, the application of fuzzing to PLCs is still in its infancy, mainly due to the unique challenges posed by the specialized nature of ICS programming languages like ST, with the need to adapt the fuzz inputs to their expected input structures during fuzzing while ensuring the safety of the physical process. ST is not foreign to these challenges, as it is one of the most widely used standardized ICS programming languages. In view of this, fuzzing techniques applied to PLCs appear extremely constrained. Actually, the majority of the existing research is focused on the communication protocols [10] and the I/O modules. Fuzzing of the control logic applications has been largely ignored, with the handful of works in this area being limited to specific PLC technologies such as Codesys [3]. These challenges are discussed further in the challenges subsection of our methodology section (Section 3.1).
This paper introduces a novel framework for fuzzing PLC control logic applications to address this shortcoming. Unlike the existing body of work that focuses on industrial protocols [10,11,12,13,14,15], our approach is optimized for fuzzing ST-based control logic applications. The proposed framework offers a general-purpose solution to fuzzing internal logic flaws, indirectly enhancing the reliability and security of ICS devices against external cyber threats. Among ICS programming languages, the proposed framework is designed for fuzzing applications written in ST, which is widely used in PLCs. The primary aim of the proposed framework is to detect logical bugs in ST programs that could potentially lead to security vulnerabilities. Although not all bugs may directly result in security vulnerabilities, the detection of these bugs is crucial for preventing potential security threats. The proposed framework is designed to detect these bugs and enhance the security and reliability of ICS devices. The framework includes a PLC runtime and a custom fuzzer that automatically generates inputs to fuzz control logic applications written in ST. The main novelty of the proposed framework lies in integrating the PLC runtime with a custom fuzzer designed to detect logical bugs that violate a correctness specification regarding the inputs and outputs of ST programs. The contributions of this paper are as follows:
  • A fuzzing framework for PLC control logic applications written in ST specified by the IEC 61131-3 [16] standard. It is worth noting that the IEC 61131-3 standard is widely recognized in the industry and defines the syntax and semantics for textual and graphical programming languages for PLCs such as ST and LL or Ladder Diagram (LD). This standardization ensures that the programs are portable across different PLC vendors. Our work, therefore, extends fuzzing to a broad range of real-world PLC applications. The novelty lies in the framework’s ability to guide the fuzzing process to fuzz internal logical flaws, thus potentially augmenting the robustness of ICS devices against external threats. This has been found crucial since ST is a widely utilized language in PLC programming, yet effective fuzzing tools specifically designed and optimized for such languages have been lacking. This framework can be a valuable tool for detecting bugs and verifying the correctness of ST programs based on a specification.
  • A custom PLC runtime is integrated into the fuzzing process. This is unique, as it provides contextual execution information for ST applications, permitting a more targeted and efficient fuzzing process. This substantially improves upon conventional techniques in which the runtime and fuzzing components frequently operate in isolation.
  • A custom fuzzer for effective input generation is explicitly designed to generate inputs for fuzzing ST-based control logic applications. This fuzzer’s utility stems from its competence in generating diverse inputs, considering the program’s context, thereby enhancing the chance of uncovering vulnerabilities that might otherwise be overlooked by a generic fuzzer.
  • An evaluation of the efficacy of our framework is performed using a collection of carefully crafted ST programs. This rigorous evaluation reinforces confidence in our proposed framework’s utility and presents a benchmark for future research in this area.
The remainder of this paper is organized as follows. Section 2 provides background information on PLCs, fuzzing, and some motivating examples. Section 3 describes the proposed fuzzing framework. Section 4 presents the experiments and results. Finally, Section 5 presents the related work, and Section 6 concludes the paper.

2. Background

In this section, we provide background information on PLCs and fuzzing, along with two examples that indicate the need for a novel fuzzing framework optimized for PLC control logic applications.

2.1. Programmable Logic Controllers

PLCs are specialized industrial devices implementing solid-state control systems with a user-programmable memory containing instructions for performing specific functions, such as I/O control, logic, timing, counting, and arithmetic [17]. They are specialized computers that are geared toward automating various manufacturing processes, utilities, and infrastructure systems. PLCs are designed to perform control functions within harsh industrial environments while withstanding extreme temperatures, vibrations, and noise conditions, among others. In other words, PLCs are tasked with the real-time control and monitoring of machinery and processes, making them indispensable components in various sectors, including automotive manufacturing, water treatment facilities, oil refineries, and power plants [3,5,18,19]. Given the crucial role of PLCs in critical infrastructures, their security and reliability are decisive. Historically, PLCs were designed to focus on safety and control, operating in isolated environments. However, the integration of PLCs with modern IT technologies, including the Internet of Things (IoT), Artificial Intelligence (AI), and cloud computing and analytics, has increased their exposure to a plethora of cyber threats. For instance, the Stuxnet worm attack in 2010 [20] highlighted the vulnerability of PLCs to sophisticated cyberattacks. It demonstrated that PLCs could be targeted by malware designed to reprogram them and, therefore, disrupt sensitive industrial processes. Echoing the significance of PLCs in various essential services, the high degree of their reliability stems from their deterministic nature, executing control logic in a predictable and cyclical manner according to a user-defined run cycle. This deterministic execution is critical for the real-time response required in automation tasks.
At their core, PLCs are governed by user-created control logic applications, often called ladder logic or control logic, written in domain-specific languages defined by the IEC 61131-3 standard [16]. The most commonly used PLC programming languages include:
  • Structured Text (ST): A high-level, block-structured language resembling Pascal or C, used for complex tasks that may be cumbersome to implement with graphical languages.
  • Ladder logic (LL): A graphical language representing control logic in a form that emulates electrical relay logic, making it intuitive for electricians and technicians.
  • Sequential Function Chart (SFC): This graphical programming language is used for designing sequential control systems and complex program structures with multiple distinct states and transitions.
  • Function Block Diagram (FBD): Another graphical language that represents functions between input and output variables using blocks connected by lines, similar to electronic circuit diagrams.

2.2. Fuzzing

Fuzzing is a technique for automatically discovering vulnerabilities in software by submitting some arbitrary combination of inputs to the test target to reveal how it responds [8,21]. Historically, first introduced by Barton Miller [22], fuzzing has since been used extensively and in diverse ways towards identifying various vulnerabilities in numerous kinds of software [9]. Based on the degree of understanding of the target program, fuzzers can be classified as black-box [23], grey-box [24], and white-box [25], with each technique being sequential, having more information available that can be leveraged for the analysis of the test target. Otherwise, fuzzers can also be classified, based on the type of input they create, into mutation based [26], generation based [12,27], and hybrid [28]. The first category mutates existing inputs to create new inputs, while the second generates new inputs from scratch from a specification, often based on a specific grammar. Hybrid fuzzers, on the other hand, combine both mutation and generation-based fuzzing techniques. Another categorization is according to the type of the adopted optimization criteria that the fuzzer utilizes. To this end, coverage-based [29] fuzzers use code coverage information to guide the generation of new inputs, while feedback-driven [30] fuzzers use runtime feedback, such as feedback from dynamic binary instrumentation, to guide the generation of new inputs. Finally, evolutionary [31] fuzzers use evolutionary algorithms to guide the creation of new inputs, considering the efficacy of the previous test cases while generating the new test cases. In this paper, we consider mutation, generation, and coverage-based fuzzing practices. These fuzzing techniques provide state-of-the-art performance [32]. In particular, we consider the American Fuzzy Lop (AFL) fuzzer [33], a coverage and mutation-based fuzzer, and specifically the AFL++ variant [34], which incorporates several improvements towards identifying vulnerabilities. It has been utilized to find critical bugs in many open-source programs, including the Linux kernel.

2.3. Motivating Examples

Logical errors or bugs in control logic applications can lead to catastrophic failures with far-reaching consequences. These errors are oftentimes the root causes of security incidents and system malfunctions in critical infrastructures. However, traditional testing approaches, including fuzzing, face challenges in detecting such errors, mainly due to real-time constraints and physical process interactions that are the common denominator among all control logic applications. Below are two of the most common scenarios that can lead to bugs in control logic applications.
One prevalent type of bug in control logic applications occurs when the input values are later subjected to incorrect arithmetic operations [35]. These wrong values are subsequently used in conditional statements, leading to unexpected behaviors that are often difficult to detect or prevent in practice.
Consider the example of a safety-critical automated temperature control system in a power plant, illustrated in Listing 1. The program aims to regulate the reactor’s temperature for safe and efficient operation. A logical bug, marked with ➀ on line 14, involves incorrect arithmetic operations that affect the branch conditions on lines 16, 19, and 22, annotated with ➁, ➂, and ➃, respectively. This bug poses potential risks during the plant’s operations.
Listing 1. Example of a logical bug in a control logic application for an automated temperature control system.
Electronics 13 02475 i001
More specifically, the principal error involves neglecting to apply the absolute value operation (ABS_REAL) in the evaluation of the temperature difference used in the condition used on line 16, noted with ➁, leading to both cooling and heating systems deactivating when not intended on lines 21 and 22. Figure 1 illustrates the Control Flow Graph (CFG) of the program and the path taken by alternative inputs, including ones that trigger the bug. In the example, the desired temperature is 500 °C. When the current temperature is 520 °C, the temperature difference is 20 °C, which is within the acceptable range. Similarly, a current temperature of 505 °C leads to a temperature difference of 5 °C still within the valid range. However, when the current temperature is 480 °C, the difference is −20 °C outside the acceptable range. The correct approach would use the absolute value to ascertain the true magnitude of deviation from the desired temperature, ensuring that temperature calibration is applied as necessary to keep it within the acceptable range. Additionally, either the cooling or heating systems should remain active, ideally, to maintain the desired temperature. However, the control logic deactivates both systems when the temperature is within the allowed threshold. A more prudent implementation would deactivate the cooling system when the temperature is above the threshold and activate the heating system when it is below to maintain the desired temperature. Overall, such a mistake in logic could lead to temperature fluctuations within the reactor, potentially impacting the safety and efficiency of the power plant operation.
Another common source of control logic bugs is when the program’s outputs are assigned erroneous values. Ideally, values of certain variables should be within acceptable ranges according to the specifications of the particular application. However, this cannot always be trivially enforced in the code during the declaration or the assignment of a variable, thus allowing typos to occur during the development time and subsequently evolve into bugs during runtime.
For example, variables corresponding to actuator states are typically defined so as REAL to achieve maximum precision. However, nothing prohibits the developer from explicitly assigning the variable with a negative value by accident. This, in theory, is still valid because negative values fall within the range of real numbers, and no alert will be triggered during development time. However, in certain applications, negative values may be incorrect.
Listing 2 is an example of a control application of a nuclear power plant’s automated reactor control system. The system regulates the coolant flow rate and control rod position within a reactor to ensure safe and efficient operation. In particular, based on the reactor mode of operation, described by the variable reactorMode, the statement on line 10 redirects the control flow of the program to define appropriate actions, e.g., regarding the coolant flow and the positioning of the control rods. In this example program, there are two bugs involving the incorrect adjustments of the control rod position and coolant flow rate, marked ➀ and ➁, which could lead to operational risks. The first bug, marked ➀, involves the control rods not being fully inserted during shutdown mode as shown in the assignment statement on line 20 in the code. The second bug, marked ➁, is that the coolant flow rate is not maximized during the emergency mode as seen with the assignment statement on line 23 in the code. As an example, correct values for the control rod position and coolant flow rate for the shutdown and emergency modes, respectively, are 100% and 50.0 L per second. In the context of this example, these values can be considered safe and optimal for the reactor’s operation during these modes.
Both the aforementioned examples demonstrate the need for rigorous testing methods to ensure the security and reliability of control logic applications. In this respect, we present a framework, dubbed StructuredFuzzer, specifically designed to fuzz PLC control logic. A PLC runtime and fuzzer are also contributed to the framework. We demonstrate the effectiveness of our approach by fuzzing a collection of carefully designed ST programs of variable complexity using our custom-tailored fuzzer developed for the purpose. To compare with existing fuzzers, we also fuzzed the same set of ST programs using AFL++ fuzzer.
Listing 2. Example of a logical bug in a control logic application for an automated reactor control system.
Electronics 13 02475 i002

3. Proposed Fuzzing Framework

In this section, we present challenges in fuzzing PLC applications and propose a fuzzing framework for addressing them.

3.1. Challenges in Fuzzing PLCs Control Applications

In this section, we elaborate on the most prominent challenges when it comes to fuzzing PLC control applications written in ST. More specifically, we have the following.
  • PLC Programming Languages and Runtime: Despite its potential, fuzzing has been underutilized in the ICS domain, mainly due to the unique challenges posed by the specialized nature of ICS programming languages and the real-time constraints under which these systems operate. PLC control binaries are compiled into specific formats for each vendor, which makes it tedious to apply a general analysis technique to secure them. The lack of standardization of the PLC runtime environments greatly exacerbates this issue. Specifically, the runtime is the software environment, running as a process of the PLC operating system (OS) in which the control logic is executed. It is responsible not only for executing the applications but also for interfacing with the physical I/O modules. Therefore, the lack of standardization of the runtime environments makes it challenging to develop a general-purpose fuzzer for control logic applications. Additionally, the runtime is itself often proprietary and closed-source, rendering the development of a fuzzer that can work across different PLC vendors even more difficult. Since the PLC runtime is often tightly integrated with the I/O modules, dissociating and fuzzing each one independently is quite cumbersome. Finally, the runtime is often optimized for real-time performance, which makes it nearly impossible to fuzz the control logic without a degradation in the performance of the PLC [3].
  • Complex Input Structures: Unlike traditional programming languages like C, ST requires explicit memory and I/O addressing during variable declaration as shown in Figure 2. Nevertheless, memory addressing is specific to the hardware of the target device in ST, in contrast to C, which is generally portable.
Moreover, conventional fuzzers like AFL++ are not configured to understand structure in values assigned to variables. In most cases, that is not an issue in C-like programs. However, in ST programs, altering the value of a variable randomly permits the alteration of the memory address portion, which in turn may lead to invalid memory locations for the target hardware, with high probability as illustrated in Figure 3. These generated values are downright rejected by the runtime. Although valid values may be eventually generated and utilized by the fuzzer, a significant amount of time is wasted in producing meaningless values. Bearing this in mind, it is rather clear that conventional fuzzers are inefficient when it comes to ST programs.
Nevertheless, it is possible to compile ST programs directly (i.e., without a runtime) to the C equivalent binary to avoid this issue. However, in this case, the behavior of the resulting binary might not be close to the actual behavior of the control application. This is because, without a PLC runtime, the resulting ST binary is not bound by the PLC run cycle and the I/Os and their response times. Consequently, many types of bugs might be missed, e.g., bugs related to the interaction with the physical environment. We address these issues with a custom input generation technique that utilizes static code analysis on the ST program to generate fuzz inputs that conform to the input structure expected by the ST binary.
  • Physical Process Interactions and Safety Concerns: PLC roles typically involve perceiving changes in the physical environment and controlling or influencing them. This means that ST applications frequently interact with physical processes, which directly affects the status of machinery. Generally, during the fuzzing process, valid inputs are extensively altered, potentially leading to software crashes of the test target. However, in cases where the target interacts with a physical process, such inputs may have calamitous consequences. Therefore, to maintain the system’s safety and reliability, it is critical to identify these issues in advance, possibly even offline, without interacting with the environment.
In this regard, the suggested framework allows users to define beforehand what constitutes correct behavior through a mechanism known as a fuzzing harness, which is subsequently utilized by the fuzzer to identify harmful side effects and logical errors. Note that this is performed in a virtual setting that is decoupled from hardware components. Unlike physical environments where hardware components are tightly integrated and often depend on each other’s outputs, our framework enables the independent examination of different system components and the generation of arbitrary inputs as needed. This capability supports concurrent fuzzing as shown in Figure 4. Note that fuzzing the ST binary using our framework is possible in both real and controlled environments, as well as in virtual settings.
In this context, the proposed PLC runtime provides a safe environment for fuzzing, allowing the user to test control logic applications without risking any actual system. Furthermore, the proposed runtime simulates a generalized PLC environment, enabling any fuzzer to interact with the control logic applications as if they were running on a real PLC. Equally important, it can also be modified or extended to offer a more faithful simulation of the physical environment, such as the behavior of I/O modules and sensors.
The choice of focusing on ST was driven by several reasons. First, ST, specified by the IEC 61131-3 standard, is a widely used language for PLC applications and shares many similarities with high-level languages like C, which simplifies our development process and enhances the general understanding and applicability of our method [16]. Secondly, while non-textual languages such as LD are commonly utilized in ICS, they also harbor additional complexities not present in ST, primarily due to their inherent graphical nature. In the case of LD, its visual component could potentially complicate the fuzzing process and pose challenges in effectively crafting fuzzed inputs. Notwithstanding, we fully acknowledge the relevance of LD and other IEC 61131-3 specified languages in industry, and we see the extension of our proposed framework to other ICS languages, including LD, as an important future work direction. Therefore, while our novel fuzzing framework currently focuses on ST, future work should enhance this platform’s versatility to cover additional languages, such as LD, used in PLC programming.

3.2. Proposed Framework Overview

We introduce StructuredFuzzer, a fuzzing framework that describes the effective implementation of ST-based PLC applications fuzzing, also bearing in mind potential remedies for the challenges discussed in Section 3.1. As illustrated in Figure 5, the framework is a four-step process comprising (1) the fuzzing harness specification, (2) the ST program compilation, (3) the fuzzing input corpus generation, and (4) the actual fuzzing of the PLC control logic.
  • Step 1: Specifying a Fuzzing Harness (Optional): The first step involves creating a harness, i.e., a user-defined set of specifications regarding the correctness of the target ST programs. In particular, the harness should provide input restrictions that are considered valid when certain outputs are observed, or the system is in certain states. If these are violated, then it is assumed that it is due to a bug. Therefore, a code for signaling a fuzzer about this should exist. The latter can be achieved through code that aborts the execution of the program or emulates a crash. Thus, the harness can be implemented in C to express some violations of the desired program’s behavior (specifications) as assertion failures. Listing 3 provides an example of a harness for the automated temperature control system application. Precisely, it specifies invalid states or conditions (violations) as crashes that the fuzzer can detect, i.e., those that deviate from the specifications ➀ to ➃. The above-described step is optional, and it typically occurs when the fuzzing process is meant to be conducted offline and in the absence of a controlled environment.
The example harness, depicted in Listing 3, is a C program that signals to a fuzzer when to detect a crash using the abort() statements. It defines the desired behavior as specifications marked by ➀ to ➃. These conditions are translated into IF statements using the PLC I/O. This provides a flexible way to test for the correctness of the control logic and enforce secure behavior.
In this context, the runtime is simply a set of linked C programs that comprise (a) the C version of the ST program and (b) a set of functions for interfacing with the hardware components of the system, e.g., I/O and network modules. As depicted in Figure 6, when a harness is provided, the PLC runtime binary includes the default networking module and an I/O adapter module instead of the default I/O module, which enables the interaction with the physical I/Os. The I/O adapter replaces the interactions with the physical I/Os with the interactions with the fuzzer. In this way, the fuzzer can provide inputs to the control logic and receive outputs from it.
Listing 3. Example of a harness for the automated temperature control system application for a desired temperature of 500 °C
Electronics 13 02475 i003
  • Step 2: ST Program Compilation: The second step of the framework depicted in Figure 5 is to transcode the ST programs to the corresponding PLC runtime. In our implementation, the compilation process is performed with the aid of Matiec iec2c compiler [36]. It is a source-to-source compiler that compiles ST programs to C. This compiler is used by many open-source projects such as OpenPLC [37].  
Moreover, the harness can be omitted if the aim of the fuzzing process is not to find bugs in the control logic. When the harness is not provided, the program is fuzzed without any restrictions and executes as it would on actual hardware. In this particular case, the fuzzer is expected to find bugs mainly in the runtime. Unlike typical workflows, we also provide a wrapper for the compiler to consider the harness as an additional input. By doing so, assertions are injected into the produced binary. These cause the fuzzer to trigger crashes for illegal conditions. Finally, the PLC runtime is responsible for executing the control logic, also capable of receiving inputs from the fuzzer.
  • Step 3: Input Generation: The third step involves generating the initial fuzzing inputs (seeds). This step is critical since using seeds from a previous fuzzing (i.e., one that was not provided with initial seeds) of the same program can be ineffective. The importance of good initial seeds for fuzzing has been demonstrated by prior studies [38,39]. For this reason, we developed a static code analysis (SCA) tool for generating good initial seeds. It utilizes the Tree-Sitter library to parse the ST program. Parsing the ST provides a more reliable way to perform various program analyses, unlike regular expressions, which are generally error-prone. Tree-Sitter [40] is a parser generator tool as well as an incremental parsing library previously used for similar purposes [41]. To parse the programs with Tree-Sitter, a grammar for the target language is required. However, there is a lack of extensive research on grammar specifically tailored for ST programming. To address this shortcoming, we construct a Tree-Sitter grammar for ST that enables us to build an abstract syntax tree (AST) from an ST source file. We utilize the AST in our analysis to extract the types and addresses of the variables used in the programs as shown in Algorithm 1. Importantly, this step is required to ensure the fuzzer generates inputs compatible with the types and addresses used within the ST program.
    Algorithm 1 Algorithm for automatic fuzzing harness generation.
    • Require:  s t _ p r o g r a m                                                                ▹ ST program source file
    • Ensure:  c _ i n p u t _ a d a p t e r                        ▹ Source file for the input adapter program
    •   1:  a s t t r e e _ s i t t e r _ p a r s e ( s t _ p r o g r a m )
    •   2:  v a r i a b l e s                                 ▹ Initialize the list of variables in the ST program
    •   3:  for   n o d e v i s i t ( a s t . r o o t _ n o d e )   do
    •   4:        if  n o d e . t y p e = v a r i a b l e _ d e c l a r a t i o n  then
    •   5:               v a r i a b l e _ n a m e g e t _ n o d e _ v a l u e ( n o d e . c h i l d r e n [ 1 ] )
    •   6:               v a r i a b l e _ t y p e g e t _ n o d e _ v a l u e ( n o d e . c h i l d r e n [ 0 ] )
    •   7:               v a r i a b l e _ a d d r e s s g e t _ n o d e _ v a l u e ( n o d e . c h i l d r e n [ 2 ] )
    •   8:               v a r i a b l e s . a p p e n d ( v a r i a b l e _ n a m e , v a r i a b l e _ t y p e , v a r i a b l e _ a d d r e s s )
    •   9:        end if
    • 10:  end for
    • 11:  c _ i n p u t _ a d a p t e r g e n e r a t e _ c _ i n p u t _ a d a p t e r ( v a r i a b l e s )
    • 12:  return  c _ i n p u t _ a d a p t e r
During the variables extraction, the algorithmic procedure traverses the nodes of the AST from the root node to the leaves as depicted in Figure 7. If a node contains a variable declaration or definition, the variable name, type, and address are extracted into a set of PLC variables as described in Algorithm 1. These variables are subsequently fed to a function for generating the I/O adapter program (written in C) that makes them available to the fuzzer as depicted in Algorithm 2.
Algorithm 2 Function g e n e r a t e _ c _ i n p u t _ a d a p t e r (Generate PLC Input Adapter Function).
  • Require:  v a r i a b l e s                                                                ▹ A list of PLC input variables.
  • Ensure:  i n p u t _ a d a p t e r                                ▹ C source file of the input adapter program
  •   1:  function  g e n e r a t e _ c _ i n p u t _ a d a p t e r ( v a r i a b l e s )
  •   2:        i n p u t _ a d a p t e r c _ h e a d e r s    ▹ Initialize the C source file with the PLC runtime C headers file
  •   3:        s e t _ p l c _ i n p u t            ▹ Source of the function for setting PLC inputs from C
  •   4:       for  v a r v a r i a b l e s  do
  •   5:              c a s t _ t y p e g e t _ t y p e _ c a s t ( v a r . t y p e )        ▹ Casting from PLC to C variables
  •   6:              a p p e n d ( s e t _ p l c _ i n p u t , v a r . n a m e , v a r . a d d r e s s , c a s t _ t y p e ) ▹ Add PLC input to set
  •   7:       end for
  •   8:        i n p u t _ a d a p t e r f o r m a t ( s e t _ p l c _ i n p u t )                ▹ Format to a C function file
  •   9:       return  i n p u t _ a d a p t e r
  • 10:  end function
The algorithm takes the list of variables for the generation of a C function. For each variable, the procedure determines its C equivalent type from the ST type. Consequently, according to line 6 of Algorithm 2, a piece of C code is added to the set_plc_input() function for declaring and setting the value of the variable based on its name, address, and casting type. After adding all the variables of the ST program to the function, the C program is finalized, incorporating the I/O adapter program and including the necessary headers to make the function accessible from the PLC runtime.
  • Step 4: Fuzzing: The final step is fuzzing the control logic using the proposed PLC runtime along with a fuzzer. To do that, we implemented a custom fuzzer in Rust based on the LibAFL [42] fuzzing library. In further detail, LibAFL is a popular library that provides a set of utilities for building custom fuzzers. It separates fuzzers into several modules, each providing core functionalities such as mutators, generators, feedbacks, observers, monitors, and executors. The LibAFL plugin-like system enables adding new components or reusing existing modules to construct fuzzers. To this extent, the proposed fuzzer reuses some core functionalities present in AFL++ but with a new custom mutator, namely, PLCRandomInputMutator, designed specifically for fuzzing control applications. As depicted in Algorithm 3, the mutator is fed with inputs derived from the provided corpus, the current state of the fuzzer, and the index of the current fuzzing stage. At the end of the procedure, the mutated inputs and a new state of the fuzzer are expected to be output. In detail, first, a random number generator based on the state of the fuzzer is initialized. Next, the current inputs are parsed into a set of ST variable structures. If the parsing fails, i.e., the list of variables is empty, the fuzzer state is set to Skipped, indicating a failed mutation; otherwise, it is set to Mutated to indicate a successful mutation. Note that for each variable in the set of PLC variables, the mutation procedure determines its size (in bits) for generating alternative inputs, using the random number generator from the fuzzer’s state to generate random values for the control logic inputs. Following, the fuzzer utilizes the mutation procedure (mutate) and the PLC runtime to fuzz the native control logic code. The execution of the program is monitored during fuzzing of the control logic until a STOP (e.g., SIGTERM or SIGKILL signals in Linux) signal is received. If the harness is provided during the compilation of the binary, the fuzzer would detect the crashes (e.g., signaled via an abort() statement). In the same vein, during fuzzing, the runtime binary would execute the code of the harness on each execution with the mutated inputs. Alternatively, a fuzzer such as AFL++ can be coupled with the proposed runtime to fuzz the control application.
    Algorithm 3  P L C R a n d o m I n p u t M u t a t o r (Random Input Generation for Fuzzing).
    • Require:  s t a t e                                                                                             ▹ Fuzzer’s state
    • Require:  i n p u t                                                                              ▹ Current input to fuzz
    • Require:  s t a g e _ i d x                                                          ▹ Current fuzzing stage index
    • Ensure:  m u t a t e d _ i n p u t s                                                               ▹ Mutated PLC inputs
    • Ensure:  n e w _ s t a t e ▹ New fuzzing state to indicate whether the mutation was applied
    •   1:  procedure Mutate( s t a t e , i n p u t , s t a g e _ i d x )
    •   2:       m u t a t e d _ i n p u t s                                               ▹ Initialize the mutated inputs
    •   3:       r n g i n i t _ r n g ( s t a t e )       ▹ Initialize the random number generator from state
    •   4:       v a r i a b l e s p a r s e _ i n p u t ( i n p u t s )                             ▹ Get the C variables from ST
    •   5:      if  v a r i a b l e s  then
    •   6:          n e w _ s t a t e S t a t e s . S k i p p e d
    •   7:      end if
    •   8:     for  v a r v a r i a b l e s  do
    •   9:         if  v a r . t y p e . s i z e = 1  then                                                     ▹ Variable size is 1 bit
    • 10:             i n p u t _ v a l u e ! v a r . v a l u e                                                 ▹ Flip boolean value
    • 11:         else if  v a r . t y p e . s i z e = 8  then                                ▹ Variable size is 8-bit (byte)
    • 12:             i n p u t _ v a l u e g e n e r a t e ( r n g , 8 )                              ▹ Generate random 8-bit
    • 13:         else if  v a r . t y p e . s i z e = 16  then                          ▹ Variable size is 16-bit (word)
    • 14:             i n p u t _ v a l u e g e n e r a t e ( r n g , 16 )                           ▹ Generate random 16-bit
    • 15:         else if  v a r . t y p e . s i z e = 32  then                       ▹ Variable size is 32-bit (double)
    • 16:             i n p u t _ v a l u e g e n e r a t e ( r n g , 32 )                          ▹ Generate random 32-bit
    • 17:         else if  v a r . t y p e . s i z e = 64  then                           ▹ Variable size is 64-bit (long)
    • 18:             i n p u t _ v a l u e g e n e r a t e ( r n g , 64 )                           ▹ Generate random 64-bit
    • 19:         end if
    • 20:          m u t a t e d _ i n p u t s . a p p e n d ( i n p u t _ v a l u e )
    • 21:          n e w _ s t a t e S t a t e s . M u t a t e d
    • 22:     end for
    • 23:     return  n e w _ s t a t e , m u t a t e d _ i n p u t s
    • 24:  end procedure

4. Experimental Evaluation

In this section, we present the experimental evaluation of the proposed framework, providing also a detailed discussion revolving around its key findings.

4.1. Experimental Setup

To evaluate our framework, we created a collection of ST programs that implement common PLC control logic application scenarios. Note that every program uses common programming structures, such as if statements, case statements, etc. The programs were created with incremental levels of complexity across several characteristics, including various branch depths and branch widths. More precisely, three of them exhibit increasing branch depth, three showcase increasing branch widths, and three demonstrate progressively complex branch conditions. Additionally, we designed 10 more complex programs resembling real-world PLC control logic. The list of programs and their descriptions are given in Table 1.
Recall that fuzzing incorporates random processes, often leading to different results in each run. To ensure the results of the evaluation are accurate, we fuzzed each test subject of Table 1 multiple times. More specifically, with the help of the HPC, we performed the fuzzing of the individual programs 20 times for 24 h, each on a node of a computing cluster. All executions were performed in the Falcon high-performance computing (HPC) cluster [43]. Each fuzzing task was given 4 GB of RAM and 4 CPUs. The fuzzers utilized for comparison purposes include our custom fuzzer and stock AFL++. One may speculate that the input generation process may be the main contributor to any speedup. To provide a more comprehensive answer, we also considered the case of AFL++ when utilizing the proposed input generation technique for creating its initial fuzzing input corpus as presented in the third step of the proposed framework (See Section 3.2). From now on, the latter test platform will be referred to as AFL++/IG. To ensure the results would be comparable, we applied filters to include only executions that lead to valid crashes (bugs). Overall, on average, 6 to 18 crashes were observed per program evaluation cycle.

4.2. Results and Discussion

We compared the results of the three fuzzers, AFL++, AFL++/IG, and our fuzzer, to quantify their crash-finding capabilities and efficiency based on the average time and number of executions required to find the logic bug. We also computed and reported the speedup achieved. We define speedup as the ratio of the average time taken by the target fuzzer (e.g., AFL++) to the average time taken by our custom-made fuzzer.
As a general remark, the results given in Table 2 show that the proposed fuzzer significantly outperforms both AFL++ and AFL++/IG. Based on the results, it is observed that (a) the proposed fuzzer can locate the bug in less than a second consistently for all test cases regardless of the complexity of their structure, (b) it usually finds the bug by at least two (frequently three and four) orders of magnitude faster than AFL++ and AFL++/IG. For example, the proposed fuzzer takes only 0.21 s to find the bug in the program with a branch width of 1 as opposed to 3954.17 and 3870.00 s, which AFL++ and AFL++/IG require, respectively. Similarly, while AFL++ and AFL++/IG take 1509.67 and 887.17 s to find the bug in a program with a branch depth of 3, the proposed fuzzer only needs 0.17 s.
Notably, a substantial improvement in terms of performance across virtually all the considered test cases is observed even in the case of the AFL++/IG fuzzer, where we simply incorporate the proposed input generation into AFL++ to create the initial fuzzing input corpus. The performance increase in AFL++/IG is up by two orders of magnitude and a factor of two in the worst case when compared to traditional AFL++. With reference to Table 2, this performance rectification can be observed in all the tested programs except the ones of Width 3 and Depth 2, where AFL++/IG takes more time to find the bug compared to AFL++. For example, AFL++/IG requires 2298.20 and 427 s, while AFL++ needs 1114.47 and 358 s, respectively, in Width 3 and Depth 3. Especially for all the considered real-world programs, AFL++/IG always outperforms AFL++ by a factor of × 63 and × 18 , on average.
Particularly, the results depicted in Figure 8 confirm the efficiency of the proposed fuzzer vis-a-vis the AFL++ and AFL++/IG fuzzers. In detail, the y-axis of the figures illustrates the time required to discover logical errors, while the x-axis indicates the varying complexity levels of the different tested ST programs. It is easy to observe that our fuzzer consistently exhibits superior performance compared to AFL++ and AFL++/IG as evidenced by the lower average times across all test cases. Notably, for all the considered real-world programs and those with various branch depths, widths, and condition test cases, our fuzzer demonstrates a distinctive cutback in the interquartile range (IQR).
Moreover, in the results with reference to Figure 8, only a few outliers were observed, affirming a consistent performance across different programs. Specifically, the outliers observed for the Depth and Width test cases (top and second figures of Figure 8) indicate that although our input generation consistently delivers strong performance—on average—when combined with AFL++, additional mutation strategies are required to improve the results on the edge cases. This gap in performance compared to our fuzzer once again underscores the importance of the custom mutator. Furthermore, the performance disparities observed in real-world programs suggest that, mainly due to the nature of the logic bugs in ST programs, a one-size-fits-all approach, like in the case of AFL++, may not be optimal. Our PLC runtime environment, designed specifically for fuzzing ST programs, enables a more precise and targeted bug discovery process through the use of a harness function, as it allows one to define program specifications used to detect violations during fuzzing. Through the experimental evaluation, we also highlight the constraints of AFL++ when applied to domain-specific languages like ST, underlining the need for specialized fuzzing tools for PLCs.
To fortify our findings, we further calculated the speedup of the proposed fuzzer against AFL++ and AFL++/IG. The results depicted in Table 2 demonstrate that the proposed fuzzer achieves a speedup ranging from a few × 100 to more than × 10 , 000 over AFL++ and AFL++/IG. Indicatively, the proposed fuzzer exhibits a speedup factor of × 8880.41 over AFL++ and a factor of × 5218.65 over AFL++/IG when considering the program with a branch depth of 3. For programs resembling real-world PLC control logic, the proposed fuzzer achieves a speedup of × 23 , 088.15 over AFL++ as opposed to × 365.69 over AFL++/IG in finding the bug in the program Complex 2.
Furthermore, Figure 9 corroborates a significant improvement in speed in terms of logic bug detection, showcasing a consistently superior speedup factor of the proposed fuzzer over the AFL++ and AFL++/IG ones. This speed discrepancy is even more apparent, particularly in programs with an increased level of the considered characteristics. This enhanced performance stems from our input generation scheme paired with our customized mutator mechanism because of the focused mutation to the PLC inputs and their adaption to the expected input structures within the ST programs. As a characteristic example, the substantial speedup observed for programs like Complex 2 and Complex 5 suggests that our fuzzer’s logic-oriented testing approach is particularly effective for programs that incorporate certain control flow statements, such as case and if statements. Moreover, integrating our input generation method with AFL++ demonstrates improved performance, albeit not as conspicuous as with our fuzzer. Despite the prevalence of AFL++/IG compared to AFL++, both are significantly slower than the proposed fuzzer. AFL++ and AFL++/IG often require several hours as opposed to less than a second to find the bug in all the considered programs. Based on these findings, the performance increase cannot solely be attributed to the proposed input generation technique. These findings imply that while the initial fuzzing corpus generation can indeed enhance the performance of an existing fuzzer (AFL++), the primary driver of efficiency lies in our custom mutator detailed in the fourth step of the proposed framework (See Section 3.2).
The results depicted in Table 3 show the average total executions for programs resembling real-world PLC programs and those with varying branch widths, depths, and conditions. The results demonstrate that our fuzzer has fewer executions of the binary during fuzzing, which is a desirable property. That is, on average, it executes the binary less than 100 times compared to AFL++/IG, which has several hundreds of executions. Nevertheless, AFL++/IG also executes the binary fewer times than AFL++. Obviously, the proposed input generation allows AFL++/IG to apply a more focused fuzzing strategy, which reduces the number of executions required to find the bug. In contrast, AFL++ requires a significantly higher number of executions, ranging from × 10 , 000 to × 100 , 000 , 000 .
As evident in Figure 10, our fuzzer exhibits the best efficiency in terms of the number of executions of the binary during fuzzing. A smaller number of executions is desired because a high number of executions increases the workload of the fuzzer. This metric is correlated to the speed of the fuzzer since a faster fuzzer would find the bugs with fewer executions of the binary. The AFL++/IG has the second-best performance based on the executions of the test cases. These findings showcase the improvement enabled by the input generation technique adopted in our fuzzer and in AFL++/IG.
Through the evaluation of the proposed fuzzing framework, we showcased its efficiency. In particular, by leveraging the proposed PLC runtime to design an input generation mechanism, we significantly improved the performance of the AFL++ fuzzer, putting forward the AFL++/IG paradigm. More importantly, our custom-made fuzzer, embedding a custom mutator, consistently surpassed AFL++ and AFL++/IG in detecting logic bugs within ST control logic programs of diverse complexities.
However, the derived results should be cautiously interpreted, as the experimental setup involved carefully designed programs to evaluate the capabilities of the considered fuzzers. A more comprehensible dataset of more realistic ST programs may introduce additional challenges.
Nevertheless, the experimental evaluation validates the hypothesis that conventional fuzzing tools are sub-optimal for discovering logic errors in ST-based PLC control logic applications. In this direction, our novel fuzzer significantly accelerates the logic bug discovery process and offers a more robust and targeted testing mechanism, thereby contributing to the overall security posture of PLCs.

5. Related Work

In this section, we review the existing literature, focusing on works that introduce some fuzzing techniques in the realm of ICS. Generally, ICS Fuzzing can be categorized into network protocol fuzzing and device fuzzing. Although our fuzzer lies in the second category, for completeness reasons, we also discuss studies in the field of network protocol fuzzing.
  • Network protocol fuzzing: Fuzzing often involves the security testing of communication protocols [10,11,12]. For instance, in PropFuzz [13], the authors present a protocol fuzzer designed for proprietary ICS protocols. The tool fuzzes network protocols by analyzing the communication between a device, say, a PLC, and an integrated development environment (IDE) to extract and mutate the relevant network fields. Then, it sends the sniffed (mutated) packets to the device. In addition, the fuzzer receives execution feedback by monitoring an output channel of the PLC. Similarly, Luo et al. present Polar [14], a protocol fuzzer that extracts semantic information from ICS protocol packets to identify vulnerable protocol function fields. The tool uses static analysis and dynamic taint analysis to identify the fields that are most likely to contain vulnerable operations and to fuzz them. The authors in CGFuzzer [15] propose a deep learning-based approach for fuzzing IIoT protocols, focusing on the DNP3 protocol. Their tool uses a coverage-guided generative adversarial network model (GAN), namely, CovGAN, to learn the specifications of the underlying network protocol and generate fuzz test cases. The authors demonstrate the effectiveness of CGFuzzer in identifying vulnerabilities in the DNP3 protocol by evaluating the fuzzer on a public dataset and an in-house capture dataset. Overall, the discussed studies underscore the significance of protocol fuzzing in improving the security of ICS devices, emphasizing the need for tools and methodologies to address the unique challenges of ICS security testing.
  • Device Fuzzing: Fuzzing has also been applied to test the security of ICS devices like PLCs. The most common approaches include emulation-based, harness-based, and on-device fuzzing [44]. Emulation-based fuzzing involves testing the firmware of the device through an emulator, i.e., a technique also known as re-hosting. For instance, developed by Scharnowski et al., Fuzzware [45] is a fuzzing tool that uses memory-mapped I/O (MMIO) to model the peripherals of devices to fuzz their firmware. It is designed to identify vulnerabilities in the firmware of embedded devices via concolic execution-based fuzzing. Similarly, Tychalas et al. present IFFSET [46], a fuzzing tool that uses Quick-Emulation (QEMU) to emulate the Linux-based ICS firmware of Codesys PLCs. The approach relies on reverse engineering the firmware to extract the linked shared objects of I/Os and network-related code that are called from a harness during fuzzing. The authors of P 2 IM [47] propose a hardware-independent firmware fuzzing via peripherals modeling. Their tool instantiates a device model from an abstract model for the ARM Cortex-M architecture. During fuzzing, their tool can discriminate between benign and crashing inputs through the proposed model. In Sizzler [48], the authors present a tool for fuzzing QEMU-based emulated PLC firmware. It utilizes a sequential generative adversarial network (SeqGAN) to generate test cases for mutation-based fuzzing. Unlike emulation-based fuzzing, harness-based fuzzing involves using a harness to connect the fuzzer and the device. For example, SP-Fuzz [49] is a tool that generates a harness in a semi-automated fashion using context information from the execution of the PLC runtime. In contrast, on-device fuzzing involves executing the fuzzer directly on the device, e.g., ICSFuzz [3].
In detail, ICSFuzz [3] is a novel fuzzing technique designed for ICS control applications. Their framework investigates the potential for exploiting PLC binaries and their environment by repurposing binary code to perform instrumented fuzzing. Their framework stands out for its capacity to manipulate I/Os and fuzz the PLC runtime. To evaluate ICSFuzz, the authors use a set of in-house PLC binaries, along with functional control applications from online repositories. During instrumentation, they use angr [50] to identify locations within the binary, where instructions could be injected for receiving execution feedback.
Although our work shares similarities with the one presented by Tychalas et al. [3], it also addresses several limitations in the ICSFuzz framework. First, ICSFuzz’s focus on vulnerabilities that can be exploited with conventional attacks is prone to missing logical bugs arising from the unique programming paradigms of the PLCs. Contrarily, our fuzzer is designed to discern and generate inputs that explore the logical flow of ST applications, going beyond the binary execution level to reveal logic-based vulnerabilities. Second, ICSFuzz heavily relies on an existing cross-compiler and operates natively on the PLC, which may restrict its usability across different PLC hardware and software configurations. Conversely, our framework tackles this limitation by incorporating a PLC runtime that abstracts the hardware layer, allowing for a more flexible and adaptable testing environment that can be applied across various PLC platforms. Last, operating ICSFuzz is constrained by Codesys-based applications modified for Wago PLCs, posing a challenge for broader applicability. In contrast, our fuzzer is developed per the IEC 61131-3 standard, ensuring compatibility with a broader range of industrial programming environments and making it a broadly applicable tool in the domain of PLC security testing.
The work on the symbolic execution of programmable logic controller code in SymPLC [41] is designed to automatically test PLC software written in languages specified by the IEC 61131-3 standard and introduces PLC-specific reduction techniques to eliminate redundant interleavings. While SymPLC represents a methodological advance, particularly in its systematic approach to exploring program paths, it differs from our fuzzing-based approach in several key aspects. Symbolic execution, as implemented in SymPLC, is inherently static and relies on a priori knowledge of all possible inputs and states, which may not be feasible for complex industrial control software that interacts with dynamic and unpredictable physical environments. In contrast, our fuzzing technique does not require exhaustive knowledge of all possible states. Instead, it dynamically generates inputs that probe the control logic in ways likely to occur during actual operation, potentially revealing logical errors that would not be manifested through static analysis alone. This dynamic aspect is particularly crucial, given the real-time operational constraints and the need for immediate response to physical process changes in industrial settings. Furthermore, SymPLC may encounter challenges when scaling to large, complex control systems due to the state explosion problem inherent in symbolic execution. On the other hand, our fuzzing methodology deftly scales as the complexity of the control logic increases since it is guided by runtime behavior and feedback, allowing it to focus on the most promising areas of the code.

6. Conclusions and Future Work

This research presents a novel approach for fuzzing PLC control logic applications, particularly targeting ST programs as specified in the IEC 61131-3 standard. The empirical evaluation of the proposed fuzzer through an extensive suite of ST programs with varying levels of complexity of alternative characteristics has yielded significant insights into the effectiveness of our methodology.
The proposed fuzzer demonstrates a consistent superiority over the conventional AFL++ fuzzer, achieving substantial speedups of several orders of magnitude and reduced bug detection times (less than a second) across all considered dimensions. This performance advantage may be attributed to our custom fuzzing mutator engine, which adapts the structure of fuzz inputs to ST programs and to the input generation mechanism, which provides good initial inputs for fuzzing. By feeding random input to targeted locations with the help of a finely tuned runtime environment, the proposed fuzzer has been proven to be an efficient tool for fuzzing PLC control applications.
The robustness of our fuzzer is evident in its ability to handle wide branches, deep nested conditions, and various program constructs, outperforming AFL++ in terms of speed. Through the evaluation of our fuzzer, we showcase its potential for improving the security and reliability of PLC software, also underscoring the limitations of applying general-purpose fuzzing tools like AFL++ to such specialized programming environments.
While the tests were conducted in a controlled software environment with carefully designed programs, the promising results advocate for the deployment and further testing of our fuzzer in real-world industrial settings. An obvious avenue for future work includes refining the fuzzing algorithms, testing the harness in a controlled environment, and validating its effectiveness on a more extensive dataset. Additionally, we plan to extend the framework to support other IEC 61131-3 languages, such as Ladder Diagram (LD), which is widely used in industry. Fuzzing LD poses unique challenges due to its graphical nature, and we aim to address these challenges in future work to enhance further the framework’s applicability and utility in real-world industrial settings. Another intriguing direction for future research involves integrating open-source language models to automate the generation of the fuzzing harness as a specification of PLC software, thus further improving the performance and usability of the proposed framework.

Author Contributions

Conceptualization, C.K.; Software, K.A.K. and J.S.; Validation, V.K. and J.S.; Formal analysis, J.S.; Investigation, K.A.K.; Data curation, V.K.; Writing—original draft, K.A.K. and C.K.; Writing—review & editing, V.K., C.K. and R.C.I.; Supervision, C.K.; Project administration, C.K.; Funding acquisition, R.C.I. All authors have read and agreed to the published version of the manuscript.

Funding

Work supported through the INL Laboratory Directed Research & Development (LDRD) Program under DOE Idaho Operations Office Contract DE-AC07-05ID14517.

Data Availability Statement

All data and scripts are publicly accessible through the following link: https://github.com/kandersonko/StructuredFuzzer, accessed on 31 May 2024.

Conflicts of Interest

The authors have no other conflicts of interest to disclose.

Abbreviations

The following abbreviations are used in this manuscript:
IGInput Generation
AFLAmerican Fuzzy Lop
AFL++American Fuzzy Lop Plus Plus
STStructured Text
SCAStatic Code Analysis
IECInternational Electrotechnical Commission
PLCProgrammable Logic Controller
LLLadder Logic
LDLadder Diagram
FBDFunction Block Diagram
SFCSequential Function Chart
ICSIndustrial Control Systems
HMIHuman–Machine Interface

References

  1. Stouffer, K.; Pease, M.; Tang, C.; Zimmerman, T.; Pillitteri, V.; Lightman, S.; Hahn, A.; Saravia, S.; Sherule, A.; Thompson, M. Guide to Operational Technology (OT) Security; Technical Report NIST Special Publication (SP) 800-82 Rev. 3; NIST: Gaithersburg, MD, USA, 2023. [Google Scholar] [CrossRef]
  2. Bhamare, D.; Zolanvari, M.; Erbad, A.; Jain, R.; Khan, K.; Meskin, N. Cybersecurity for industrial control systems: A survey. Comput. Secur. 2020, 89, 101677. [Google Scholar] [CrossRef]
  3. Tychalas, D.; Benkraouda, H.; Maniatakos, M. {ICSFuzz}: Manipulating {I/Os} and Repurposing Binary Code to Enable Instrumented Fuzzing in {ICS} Control Applications. In Proceedings of the 30th USENIX Security Symposium (USENIX Security 21), Vancouver, BC, Canada, 11–13 August 2021; pp. 2847–2862. [Google Scholar]
  4. Shehod, A. Ukraine power grid cyberattack and US susceptibility: Cybersecurity implications of smart grid advancements in the US. Cybersecur. Interdiscip. Syst. Lab. MIT 2016, 22, 2016-22. [Google Scholar]
  5. Myung, J.w.; Hong, S. ICS malware Triton attack and countermeasures. Int. J. Emerg. Multidiscip. Res. 2019, 3, 13–17. [Google Scholar] [CrossRef]
  6. Robles, F.; Perlroth, N. Dangerous Stuff’: Hackers Tried to Poison Water Supply of Florida Town. The New York Times, 2021. [Google Scholar]
  7. Hajda, J.; Jakuszewski, R.; Ogonowski, S. Security challenges in industry 4.0 PLC Systems. Appl. Sci. 2021, 11, 9785. [Google Scholar] [CrossRef]
  8. NIST Glossary: Fuzz Testing. Available online: https://csrc.nist.gov/glossary/term/fuzz_testing (accessed on 20 April 2024).
  9. Li, J.; Zhao, B.; Zhang, C. Fuzzing: A survey. Cybersecurity 2018, 1, 1–13. [Google Scholar] [CrossRef]
  10. Chen, Y.; Poskitt, C.M.; Sun, J.; Adepu, S.; Zhang, F. Learning-Guided Network Fuzzing for Testing Cyber-Physical System Defences. In Proceedings of the 2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE), San Diego, CA, USA, 11–15 November 2019; pp. 962–973. [Google Scholar] [CrossRef]
  11. Wijaya, H.; Aniche, M.; Mathur, A. Domain-Based Fuzzing for Supervised Learning of Anomaly Detection in Cyber-Physical Systems. In Proceedings of the IEEE/ACM 42nd International Conference on Software Engineering Workshops, ICSEW’20, Seoul, Republic of Korea, 27 June–19 July 2020; pp. 237–244. [Google Scholar] [CrossRef]
  12. Kampourakis, V.; Chatzoglou, E.; Kambourakis, G.; Dolmes, A.; Zaroliagis, C. Wpaxfuzz: Sniffing out vulnerabilities in wi-fi implementations. Cryptography 2022, 6, 53. [Google Scholar] [CrossRef]
  13. Niedermaier, M.; Fischer, F.; von Bodisco, A. PropFuzz—An IT-security fuzzing framework for proprietary ICS protocols. In Proceedings of the 2017 International Conference on Applied Electronics (AE), Pilsen, Czech Republic, 5–6 September 2017; pp. 1–4. [Google Scholar] [CrossRef]
  14. Luo, Z.; Zuo, F.; Jiang, Y.; Gao, J.; Jiao, X.; Sun, J. Polar: Function Code Aware Fuzz Testing of ICS Protocol. ACM Trans. Embed. Comput. Syst. 2019, 18, 93:1–93:22. [Google Scholar] [CrossRef]
  15. Yu, Z.; Wang, H.; Wang, D.; Li, Z.; Song, H. CGFuzzer: A Fuzzing Approach Based on Coverage-Guided Generative Adversarial Networks for Industrial IoT Protocols. IEEE Internet Things J. 2022, 9, 21607–21619. [Google Scholar] [CrossRef]
  16. Tiegelkamp, M.; John, K.H. IEC 61131-3: Programming Industrial Automation Systems; Springer: Berlin/Heidelberg, Germany, 2010; Volume 166. [Google Scholar]
  17. Editor, C.C. Programmable Logic Controller—Glossary|CSRC. Available online: https://csrc.nist.gov/glossary/term/programmable_logic_controller (accessed on 22 April 2024).
  18. Di Pinto, A.; Dragoni, Y.; Carcano, A. TRITON: The first ICS cyber attack on safety instrument systems. Proc. Black Hat USA 2018, 2018, 1–26. [Google Scholar]
  19. Kampourakis, V.; Gkioulos, V.; Katsikas, S. A systematic literature review on wireless security testbeds in the cyber-physical realm. Comput. Secur. 2023, 133, 103383. [Google Scholar] [CrossRef]
  20. Kushner, D. The real story of stuxnet. IEEE Spectr. 2013, 50, 48–53. [Google Scholar] [CrossRef]
  21. Eisele, M.; Maugeri, M.; Shriwas, R.; Huth, C.; Bella, G. Embedded fuzzing: A review of challenges, tools, and solutions. Cybersecurity 2022, 5, 18. [Google Scholar] [CrossRef]
  22. Miller, B.P.; Fredriksen, L.; So, B. An empirical study of the reliability of UNIX utilities. Commun. ACM 1990, 33, 32–44. [Google Scholar] [CrossRef]
  23. Gascon, H.; Wressnegger, C.; Yamaguchi, F.; Arp, D.; Rieck, K. Pulsar: Stateful black-box fuzzing of proprietary network protocols. In Proceedings of the Security and Privacy in Communication Networks: 11th EAI International Conference, SecureComm 2015, Dallas, TX, USA, 26–29 October 2015; Springer: Berlin/Heidelberg, Germany, 2015; pp. 330–347. [Google Scholar]
  24. Böhme, M.; Pham, V.T.; Nguyen, M.D.; Roychoudhury, A. Directed greybox fuzzing. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, TX, USA, 30 October–3 November 2017; pp. 2329–2344. [Google Scholar]
  25. Zhang, M.; Arcuri, A.; Li, Y.; Liu, Y.; Xue, K. White-box fuzzing RPC-based APIs with EvoMaster: An industrial case study. ACM Trans. Softw. Eng. Methodol. 2023, 32, 1–38. [Google Scholar] [CrossRef]
  26. Lyu, C.; Ji, S.; Zhang, C.; Li, Y.; Lee, W.H.; Song, Y.; Beyah, R. {MOPT}: Optimized mutation scheduling for fuzzers. In Proceedings of the 28th USENIX Security Symposium (USENIX Security 19), Santa Clara, CA, USA, 14–16 August 2019; pp. 1949–1966. [Google Scholar]
  27. Wang, J.; Chen, B.; Wei, L.; Liu, Y. Skyfire: Data-driven seed generation for fuzzing. In Proceedings of the 2017 IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA, 25 May 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 579–594. [Google Scholar] [CrossRef]
  28. Chen, Y.; Li, P.; Xu, J.; Guo, S.; Zhou, R.; Zhang, Y.; Wei, T.; Lu, L. SAVIOR: Towards Bug-Driven Hybrid Testing. In Proceedings of the 2020 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 21 May 2020; pp. 1580–1596, ISSN 2375-1207. [Google Scholar] [CrossRef]
  29. Hsu, C.C.; Wu, C.Y.; Hsiao, H.C.; Huang, S.K. Instrim: Lightweight instrumentation for coverage-guided fuzzing. In Proceedings of the Symposium on Network and Distributed System Security (NDSS), Workshop on Binary Analysis Research, San Diego, CA, USA, 18–21 February 2018; Volume 40. [Google Scholar]
  30. Li, W.; Shi, J.; Li, F.; Lin, J.; Wang, W.; Guan, L. µAFL: Non-intrusive feedback-driven fuzzing for microcontroller firmware. In Proceedings of the 44th International Conference on Software Engineering, Pittsburgh Pennsylvania, San Diego, CA, USA, 8–27 May 2022; pp. 1–12. [Google Scholar] [CrossRef]
  31. Rawat, S.; Jain, V.; Kumar, A.; Cojocar, L.; Giuffrida, C.; Bos, H. VUzzer: Application-aware Evolutionary Fuzzing. In Proceedings of the NDSS, San Diego, CA, USA, 26 February–1 March 2017; Volume 17, pp. 1–14. [Google Scholar]
  32. FuzzBench: Oss-Fuzz-Benchmarks Report (Running). Available online: https://commondatastorage.googleapis.com/fuzzbench-reports/oss-fuzz-benchmarks/index.html (accessed on 22 April 2024).
  33. American Fuzzy Lop. Available online: https://lcamtuf.coredump.cx/afl/ (accessed on 12 April 2024).
  34. Fioraldi, A.; Maier, D.; Eißfeldt, H.; Heuse, M. {AFL++}: Combining incremental steps of fuzzing research. In Proceedings of the 14th USENIX Workshop on Offensive Technologies (WOOT 20), Boston, MA, USA, 10–11 August 2020. [Google Scholar]
  35. Serhane, A.; Raad, M.; Raad, R.; Susilo, W. Programmable logic controllers based systems (PLC-BS): Vulnerabilities and threats. SN Appl. Sci. 2019, 1, 924. [Google Scholar] [CrossRef]
  36. Catalão, T.H.A.A. An LLVM Based Compiler for the IEC 61131-3. Master’s Thesis, University of Porto, Porto, Portugal, 2020. [Google Scholar]
  37. Alves, T.R.; Buratto, M.; De Souza, F.M.; Rodrigues, T.V. OpenPLC: An open source alternative to automation. In Proceedings of the IEEE Global Humanitarian Technology Conference (GHTC 2014), San Jose, CA, USA, 10–13 October 2014; IEEE: Piscataway, NJ, USA, 2014; pp. 585–589. [Google Scholar] [CrossRef]
  38. Wang, M.; Liang, J.; Chen, Y.; Jiang, Y.; Jiao, X.; Liu, H.; Bin Zhao, X.; Sun, J. SAFL: Increasing and accelerating testing coverage with symbolic execution and guided fuzzing. In Proceedings of the 2018 IEEE/ACM 40th International Conference on Software Engineering: Companion (ICSE-Companion), Gothenburg, Sweden, 27 May–3 June 2018; pp. 61–64. [Google Scholar] [CrossRef]
  39. Cheng, L.; Zhang, Y.; Zhang, Y.; Wu, C.; Li, Z.; Fu, Y.; Li, H. Optimizing seed inputs in fuzzing with machine learning. In Proceedings of the 2019 IEEE/ACM 41st International Conference on Software Engineering: Companion Proceedings (ICSE-Companion), Montreal, QC, Canada, 25–31 May 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 244–245. [Google Scholar]
  40. Latif, A.; Azam, F.; Anwar, M.; Zafar, A. Comparison of Leading Language Parsers—ANTLR, JavaCC, SableCC, Tree-sitter, Yacc, Bison. In Proceedings of the 2023 13th International Conference on Software Technology and Engineering (ICSTE), Osaka, Japan, 27–29 October 2023; pp. 7–13. [Google Scholar] [CrossRef]
  41. Guo, S.; Wu, M.; Wang, C. Symbolic execution of programmable logic controller code. In Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, ESEC/FSE 2017, Paderborn, Germany, 4–8 September 2017; pp. 326–336. [Google Scholar] [CrossRef]
  42. Fioraldi, A.; Maier, D.C.; Zhang, D.; Balzarotti, D. Libafl: A framework to build modular and reusable fuzzers. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, Los Angeles, CA, USA, 11 November 2022; pp. 1051–1065. [Google Scholar]
  43. Falcon. 2023. Available online: https://www.c3plus3.org/falcon/ (accessed on 17 January 2024).
  44. Yun, J.; Rustamov, F.; Kim, J.; Shin, Y. Fuzzing of Embedded Systems: A Survey. ACM Comput. Surv. 2023, 55, 1–33. [Google Scholar] [CrossRef]
  45. Scharnowski, T.; Bars, N.; Schloegel, M.; Gustafson, E.; Muench, M.; Vigna, G.; Kruegel, C.; Holz, T.; Abbasi, A. Fuzzware: Using Precise {MMIO} Modeling for Effective Firmware Fuzzing. In Proceedings of the 31st USENIX Security Symposium (USENIX Security 22), Boston, MA, USA, 10–12 August 2022; pp. 1239–1256. [Google Scholar]
  46. Tychalas, D.; Maniatakos, M. IFFSET: In-Field Fuzzing of Industrial Control Systems using System Emulation. In Proceedings of the 2020 Design, Automation & Test in Europe Conference & Exhibition (DATE), Grenoble, France, 9–13 March 2020; pp. 662–665, ISSN 1558-1101. [Google Scholar] [CrossRef]
  47. Feng, B.; Mera, A.; Lu, L. {P2IM}: Scalable and Hardware-independent Firmware Testing via Automatic Peripheral Interface Modeling. In Proceedings of the 29th USENIX Security Symposium (USENIX Security 20), Boston, MA, USA, 12–14 August 2020; pp. 1237–1254. [Google Scholar]
  48. Feng, K.; Cook, M.M.; Marnerides, A.K. Sizzler: Sequential Fuzzing in Ladder Diagrams for Vulnerability Detection and Discovery in Programmable Logic Controllers. IEEE Trans. Inf. Forensics Secur. 2024, 19, 1660–1671. [Google Scholar] [CrossRef]
  49. Jeon, S.; Seo, J.T. SP-Fuzz: Fuzzing Soft PLC with Semi-automated Harness Synthesis. In Proceedings of the Information Security Applications (WISA 2023), Jeju Island, Republic of Korea, 23–25 August 2023; Kim, H., Youn, J., Eds.; 2023; pp. 282–293. [Google Scholar] [CrossRef]
  50. Wang, F.; Shoshitaishvili, Y. Angr-The Next Generation of Binary Analysis. In Proceedings of the 2017 IEEE Cybersecurity Development (SecDev), Cambridge, MA, USA, 24–26 September 2017; pp. 8–9. [Google Scholar] [CrossRef]
Figure 1. Illustrative CFG of the automated temperature control example.
Figure 1. Illustrative CFG of the automated temperature control example.
Electronics 13 02475 g001
Figure 2. Comparison of variable declarations in ST and C programming languages. Notice the presence of an explicit memory address that makes the declaration in ST non-trivial.
Figure 2. Comparison of variable declarations in ST and C programming languages. Notice the presence of an explicit memory address that makes the declaration in ST non-trivial.
Electronics 13 02475 g002
Figure 3. ST Input structure and example of mutated inputs generated by AFL++ and our fuzzer for the automated temperature control ST program. The mutated parts of the inputs are highlighted in blue. Notice how AFL++ is free to mutate the address part of the inputs, while our fuzzer is restricted to mutating the actual values.
Figure 3. ST Input structure and example of mutated inputs generated by AFL++ and our fuzzer for the automated temperature control ST program. The mutated parts of the inputs are highlighted in blue. Notice how AFL++ is free to mutate the address part of the inputs, while our fuzzer is restricted to mutating the actual values.
Electronics 13 02475 g003
Figure 4. Fuzzing the automated temperature control ST program in a virtual environment enables parallel fuzzing compared to a physical/controlled environment. Note that both the heating and cooling systems can be fuzzed independently.
Figure 4. Fuzzing the automated temperature control ST program in a virtual environment enables parallel fuzzing compared to a physical/controlled environment. Note that both the heating and cooling systems can be fuzzed independently.
Electronics 13 02475 g004
Figure 5. The proposed fuzzing framework.
Figure 5. The proposed fuzzing framework.
Electronics 13 02475 g005
Figure 6. Compilation process of the ST program to the PLC runtime.
Figure 6. Compilation process of the ST program to the PLC runtime.
Electronics 13 02475 g006
Figure 7. Example of an AST generated by Tree-Sitter for the variable declaration of reactorMode in the automated reactor control program. Notice that Algorithm 1 would traverse each variable_declaration node to extract the variable name, type, and address from its children.
Figure 7. Example of an AST generated by Tree-Sitter for the variable declaration of reactorMode in the automated reactor control program. Notice that Algorithm 1 would traverse each variable_declaration node to extract the variable name, type, and address from its children.
Electronics 13 02475 g007
Figure 8. Time to find the bugs for the programs with various branch depths (top), widths (second from the top), conditions (third from the top), and real-world programs (bottom).
Figure 8. Time to find the bugs for the programs with various branch depths (top), widths (second from the top), conditions (third from the top), and real-world programs (bottom).
Electronics 13 02475 g008
Figure 9. Speedup of the proposed fuzzer in finding the bugs compared against AFL++ for the programs with various branch depths (top), widths (second from the top), conditions (third from the top), and real-world programs (bottom).
Figure 9. Speedup of the proposed fuzzer in finding the bugs compared against AFL++ for the programs with various branch depths (top), widths (second from the top), conditions (third from the top), and real-world programs (bottom).
Electronics 13 02475 g009
Figure 10. Total number of executions for programs with varying branch depths (top), widths (third from top), conditions (second from bottom), and real-world programs (bottom). Lower is better.
Figure 10. Total number of executions for programs with varying branch depths (top), widths (third from top), conditions (second from bottom), and real-world programs (bottom). Lower is better.
Electronics 13 02475 g010aElectronics 13 02475 g010b
Table 1. Description of the ST programs used in the experiments.
Table 1. Description of the ST programs used in the experiments.
ProgramsCharacteristicsDescription
Depth 1 to 3Branch DepthPrograms with increasing branch depths
Width 1 to 3Branch WidthPrograms with increasing branch widths
Condition 1 to 3Branch ConditionPrograms with various branch conditions complexities
Complex 1 to 10Real-world ProgramPrograms resembling real-world PLC programs
Table 2. Average time in sec (lower is better) and speedup (higher is better) to find the crash for each fuzzer.
Table 2. Average time in sec (lower is better) and speedup (higher is better) to find the crash for each fuzzer.
CharacteristicsAFL++AFL++/IGOur FuzzerSpeedup AFL + + Fuzzer Speedup AFL + + / IG Fuzzer
Branch Depth
Depth 1559.2916.860.134302.23129.69
Depth 2358.00427.000.142557.143050.00
Depth 31509.67887.170.178880.415218.65
Branch Width
Width 13954.173870.000.2118,829.3818,428.57
Width 22174.331943.500.1911,443.8410,228.95
Width 31114.472298.200.205572.3511,491.00
Branch Condition
Condition 1220.4719.880.141574.79142.00
Condition 2522.14140.000.153480.93933.33
Condition 3561.5075.250.144010.71537.50
Real-world Program
Complex 1780.6720.080.243252.7983.67
Complex 26002.9295.080.2623,088.15365.69
Complex 31361.44844.220.197165.474443.26
Complex 45378.272655.820.4113,117.736477.61
Complex 53975.45909.000.2019,877.254545.00
Complex 62379.8044.400.1614,873.75277.50
Complex 7993.3877.620.175843.41456.59
Complex 81223.701167.000.284370.364167.86
Complex 91082.22380.560.283865.071359.14
Complex 101496.67473.110.552721.22860.20
Table 3. Average total number of executions for each fuzzer for the depth, width, condition test cases, and real-world programs. A small number of executions is desirable.
Table 3. Average total number of executions for each fuzzer for the depth, width, condition test cases, and real-world programs. A small number of executions is desirable.
CharacteristicsAFL++AFL++/IGOur Fuzzer
Branch Depth
Depth 1273,970.005591.577.43
Depth 2179,891.75334,971.259.88
Depth 3942,404.50441,799.6713.50
Branch Width
Width 11,882,189.501,459,524.831.0
Width 2710,572.67577,395.331.0
Width 3765,733.931,677,735.471.0
Branch Condition
Condition 1110,527.246581.533.65
Condition 291,400.4316,189.001.00
Condition 3122,671.007353.384.38
Real-world Program
Complex 164,996.17772.921.00
Complex 22,841,554.003275.0013.62
Complex 3367,426.44124,724.565.56
Complex 42,967,611.731,427,264.821.00
Complex 51,615,857.82106,716.457.64
Complex 6734,122.601464.201.00
Complex 796,081.502249.123.25
Complex 8189,611.80181,804.1058.70
Complex 9141,941.1118,508.1160.11
Complex 10402,542.3336,779.2295.11
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Koffi, K.A.; Kampourakis, V.; Song, J.; Kolias, C.; Ivans, R.C. StructuredFuzzer: Fuzzing Structured Text-Based Control Logic Applications. Electronics 2024, 13, 2475. https://doi.org/10.3390/electronics13132475

AMA Style

Koffi KA, Kampourakis V, Song J, Kolias C, Ivans RC. StructuredFuzzer: Fuzzing Structured Text-Based Control Logic Applications. Electronics. 2024; 13(13):2475. https://doi.org/10.3390/electronics13132475

Chicago/Turabian Style

Koffi, Koffi Anderson, Vyron Kampourakis, Jia Song, Constantinos Kolias, and Robert C. Ivans. 2024. "StructuredFuzzer: Fuzzing Structured Text-Based Control Logic Applications" Electronics 13, no. 13: 2475. https://doi.org/10.3390/electronics13132475

APA Style

Koffi, K. A., Kampourakis, V., Song, J., Kolias, C., & Ivans, R. C. (2024). StructuredFuzzer: Fuzzing Structured Text-Based Control Logic Applications. Electronics, 13(13), 2475. https://doi.org/10.3390/electronics13132475

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop