{"id":"https://openalex.org/W2963165706","doi":"https://doi.org/10.1109/access.2019.2931061","title":"Finding Sands in the Eyes: Vulnerabilities Discovery in IoT With EUFuzzer on Human Machine Interface","display_name":"Finding Sands in the Eyes: Vulnerabilities Discovery in IoT With EUFuzzer on Human Machine Interface","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2963165706","doi":"https://doi.org/10.1109/access.2019.2931061","mag":"2963165706"},"language":"en","primary_location":{"id":"doi:10.1109/access.2019.2931061","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2931061","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08772079.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08772079.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5006679818","display_name":"Jiaping Men","orcid":"https://orcid.org/0000-0002-6644-8348"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jiaping Men","raw_affiliation_strings":["Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, School of Computer and Information Technology, Beijing Jiaotong University, Beijing, China"],"raw_orcid":"https://orcid.org/0000-0002-6644-8348","affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, School of Computer and Information Technology, Beijing Jiaotong University, Beijing, China","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5112869781","display_name":"Guangquan Xu","orcid":"https://orcid.org/0000-0001-8795-8542"},"institutions":[{"id":"https://openalex.org/I162868743","display_name":"Tianjin University","ror":"https://ror.org/012tb2g32","country_code":"CN","type":"education","lineage":["https://openalex.org/I162868743"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guangquan Xu","raw_affiliation_strings":["Tianjin Key Laboratory of Advanced Networking (TANK), College of Intelligence and Computing, Tianjin University, Tianjin, China"],"raw_orcid":"https://orcid.org/0000-0003-2079-0989","affiliations":[{"raw_affiliation_string":"Tianjin Key Laboratory of Advanced Networking (TANK), College of Intelligence and Computing, Tianjin University, Tianjin, China","institution_ids":["https://openalex.org/I162868743"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059369429","display_name":"Zhen Han","orcid":"https://orcid.org/0000-0002-3688-873X"},"institutions":[{"id":"https://openalex.org/I21193070","display_name":"Beijing Jiaotong University","ror":"https://ror.org/01yj56c84","country_code":"CN","type":"education","lineage":["https://openalex.org/I21193070"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhen Han","raw_affiliation_strings":["Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, School of Computer and Information Technology, Beijing Jiaotong University, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, School of Computer and Information Technology, Beijing Jiaotong University, Beijing, China","institution_ids":["https://openalex.org/I21193070"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101727861","display_name":"Zhonghao Sun","orcid":"https://orcid.org/0009-0009-1098-2451"},"institutions":[{"id":"https://openalex.org/I4210087772","display_name":"National Computer Network Emergency Response Technical Team/Coordination Center of Chinar","ror":"https://ror.org/00247dh76","country_code":"CN","type":"nonprofit","lineage":["https://openalex.org/I4210087772"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhonghao Sun","raw_affiliation_strings":["National Computer Network Emergency Response Technical Team/Coordination Center of China, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"National Computer Network Emergency Response Technical Team/Coordination Center of China, China","institution_ids":["https://openalex.org/I4210087772"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022312188","display_name":"Xiaojun Zhou","orcid":"https://orcid.org/0000-0002-6367-696X"},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaojun Zhou","raw_affiliation_strings":["Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5022783715","display_name":"Wenjuan Lian","orcid":"https://orcid.org/0000-0002-5339-1303"},"institutions":[{"id":"https://openalex.org/I80143920","display_name":"Shandong University of Science and Technology","ror":"https://ror.org/04gtjhw98","country_code":"CN","type":"education","lineage":["https://openalex.org/I80143920"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wenjuan Lian","raw_affiliation_strings":["College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao, China","institution_ids":["https://openalex.org/I80143920"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5027459275","display_name":"Xiaochun Cheng","orcid":"https://orcid.org/0000-0003-0371-9646"},"institutions":[{"id":"https://openalex.org/I60488453","display_name":"Middlesex University","ror":"https://ror.org/01rv4p989","country_code":"GB","type":"education","lineage":["https://openalex.org/I60488453"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Xiaochun Cheng","raw_affiliation_strings":["Department of Computer Sciences and Faculty of Science and Technology, Middlesex University, London, U.K"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Department of Computer Sciences and Faculty of Science and Technology, Middlesex University, London, U.K","institution_ids":["https://openalex.org/I60488453"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5006679818"],"corresponding_institution_ids":["https://openalex.org/I21193070"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":2.6713,"has_fulltext":true,"cited_by_count":27,"citation_normalized_percentile":{"value":0.90983307,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":"7","issue":null,"first_page":"103751","last_page":"103759"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fuzz-testing","display_name":"Fuzz testing","score":0.943323016166687},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7827835083007812},{"id":"https://openalex.org/keywords/scada","display_name":"SCADA","score":0.7727318406105042},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5676131844520569},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5580222010612488},{"id":"https://openalex.org/keywords/interface","display_name":"Interface (matter)","score":0.5120892524719238},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.49730971455574036},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4790138602256775},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.47538912296295166},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4265350103378296},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3569064140319824},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.12054786086082458}],"concepts":[{"id":"https://openalex.org/C111065885","wikidata":"https://www.wikidata.org/wiki/Q1189053","display_name":"Fuzz testing","level":3,"score":0.943323016166687},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7827835083007812},{"id":"https://openalex.org/C113863187","wikidata":"https://www.wikidata.org/wiki/Q17498","display_name":"SCADA","level":2,"score":0.7727318406105042},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5676131844520569},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5580222010612488},{"id":"https://openalex.org/C113843644","wikidata":"https://www.wikidata.org/wiki/Q901882","display_name":"Interface (matter)","level":4,"score":0.5120892524719238},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.49730971455574036},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4790138602256775},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.47538912296295166},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4265350103378296},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3569064140319824},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.12054786086082458},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C119599485","wikidata":"https://www.wikidata.org/wiki/Q43035","display_name":"Electrical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C157915830","wikidata":"https://www.wikidata.org/wiki/Q2928001","display_name":"Bubble","level":2,"score":0.0},{"id":"https://openalex.org/C129307140","wikidata":"https://www.wikidata.org/wiki/Q6795880","display_name":"Maximum bubble pressure method","level":3,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/access.2019.2931061","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2931061","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08772079.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:eprints.mdx.ac.uk:26997","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4306400025","display_name":"Middlesex University Research Repository (Middlesex University Of London)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I60488453","host_organization_name":"Middlesex University","host_organization_lineage":["https://openalex.org/I60488453"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"Article"},{"id":"pmh:oai:doaj.org/article:46c98c1d967d44a0bc15bc0c76b92523","is_oa":true,"landing_page_url":"https://doaj.org/article/46c98c1d967d44a0bc15bc0c76b92523","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 7, Pp 103751-103759 (2019)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2019.2931061","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2019.2931061","pdf_url":"https://ieeexplore.ieee.org/ielx7/6287639/8600701/08772079.pdf","source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G3120769444","display_name":null,"funder_award_id":"U1736114","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G605921640","display_name":null,"funder_award_id":"U1736115","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320318551","display_name":"National Computer Network Emergency Response Technical Team/Coordination Center of China","ror":"https://ror.org/00247dh76"},{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2963165706.pdf","grobid_xml":"https://content.openalex.org/works/W2963165706.grobid-xml"},"referenced_works_count":41,"referenced_works":["https://openalex.org/W7586523","https://openalex.org/W614438062","https://openalex.org/W1489157620","https://openalex.org/W1507845365","https://openalex.org/W1651093245","https://openalex.org/W1991796154","https://openalex.org/W2002934700","https://openalex.org/W2003282593","https://openalex.org/W2014290672","https://openalex.org/W2024964356","https://openalex.org/W2033339460","https://openalex.org/W2042033151","https://openalex.org/W2087970742","https://openalex.org/W2110437951","https://openalex.org/W2116818527","https://openalex.org/W2128128820","https://openalex.org/W2143210482","https://openalex.org/W2147067398","https://openalex.org/W2149531726","https://openalex.org/W2153400751","https://openalex.org/W2480640361","https://openalex.org/W2531160404","https://openalex.org/W2574017551","https://openalex.org/W2574022511","https://openalex.org/W2599393174","https://openalex.org/W2604504584","https://openalex.org/W2611461819","https://openalex.org/W2791200528","https://openalex.org/W2800912855","https://openalex.org/W2802756541","https://openalex.org/W2808213784","https://openalex.org/W2808378737","https://openalex.org/W2919545980","https://openalex.org/W4242736786","https://openalex.org/W4285719527","https://openalex.org/W6619192471","https://openalex.org/W6629319858","https://openalex.org/W6630124987","https://openalex.org/W6637231022","https://openalex.org/W6677864018","https://openalex.org/W6682619475"],"related_works":["https://openalex.org/W2511770387","https://openalex.org/W3120811337","https://openalex.org/W2766647240","https://openalex.org/W4385301282","https://openalex.org/W2990186179","https://openalex.org/W3203597304","https://openalex.org/W4248424560","https://openalex.org/W4210660460","https://openalex.org/W3119380829","https://openalex.org/W2521811015"],"abstract_inverted_index":{"In":[0,119],"supervisory":[1],"control":[2,76],"and":[3,24,36,40,96,145,175,203],"data":[4,22],"acquisition":[5,23],"(SCADA)":[6],"systems":[7],"or":[8],"the":[9,19,27,33,43,58,61,82,111,142,192],"Internet":[10],"of":[11,21,32,47,53,60,114,141,171,183],"Things":[12],"(IoT),":[13],"human":[14],"machine":[15],"interface":[16],"(HMI)":[17],"performs":[18],"function":[20],"control,":[25],"providing":[26],"operators":[28],"with":[29,42],"a":[30,99,116,125,154],"view":[31,54],"whole":[34,62],"plant":[35],"access":[37],"to":[38,66,80,129,160,207],"monitoring":[39],"interacting":[41],"system.":[44],"The":[45,68,163],"compromise":[46],"HMI":[48,79,85,115,133],"will":[49],"result":[50],"in":[51,132],"lost":[52],"(LoV),":[55],"which":[56,93,191],"means":[57],"state":[59],"system":[63],"is":[64,71,169],"invisible":[65],"operators.":[67],"worst":[69],"case":[70],"that":[72,167,198],"adversaries":[73],"can":[74],"manipulate":[75],"commands":[77],"through":[78],"damage":[81],"physical":[83],"plant.":[84],"often":[86],"relies":[87],"on":[88,189],"poorly":[89],"understood":[90],"proprietary":[91,185],"protocols,":[92],"are":[94],"time-sensitive,":[95],"usually":[97],"keeps":[98],"persistent":[100],"connection":[101],"for":[102],"hours":[103],"even":[104],"days.":[105],"All":[106],"these":[107],"factors":[108],"together":[109],"make":[110],"vulnerability":[112,134],"mining":[113],"tough":[117],"job.":[118],"this":[120],"paper,":[121],"we":[122],"present":[123],"EUFuzzer,":[124],"novel":[126],"fuzzing":[127,158],"tool":[128],"assist":[130],"testers":[131],"discovery.":[135],"EUFuzzer":[136,168,178],"first":[137],"identifies":[138],"packet":[139,173],"fields":[140,148,174],"specific":[143],"protocol":[144,187],"classifies":[146],"all":[147],"into":[149],"four":[150,199],"types,":[151],"then":[152],"using":[153],"relatively":[155],"high":[156],"efficiency":[157],"method":[159],"test":[161],"HMI.":[162],"experimental":[164],"results":[165],"show":[166],"capable":[170],"identifying":[172],"revealing":[176],"bugs.":[177],"also":[179],"successfully":[180],"triggers":[181],"flaws":[182],"actual":[184],"SCADA":[186,193],"implementation":[188],"HMI,":[190],"software":[194],"vendor":[195],"has":[196,204],"confirmed":[197],"were":[200],"zero-day":[201],"vulnerabilities":[202],"taken":[205],"measures":[206],"patch":[208],"up.":[209]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":6},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":7},{"year":2019,"cited_by_count":3}],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2025-10-10T00:00:00"}
