Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Subscribe
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Subscribe
    Home Cybersecurity
    • Cybersecurity

    Fuzzing Analysis Shows ICS, IoT Industries Most at Risk of Zero Days

    Written by

    Robert Lemos
    Published August 10, 2017
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      Industrial control systems and the Internet-of-Things are the industries most likely to have unknown vulnerabilities in their products, because their development processes are the least mature, according to data from more than 4.8 billion automated tests conducted by clients of security-services firm Synopsys.

      The data comes from fuzz testing, or fuzzing, an automated process that systematically sends data to devices and systems with the goal of causing errors in a targeted network protocol. Overall, the testing of more than 250 protocols saw the first failure within 1.4 hours on average.

      Yet, the time to first failure (TTFF) was highly protocol dependent. One niche technology used by Internet of Things (IoT) and industrial control system (ICS) manufacturers failed within 6.6 seconds.

      Because the software defects were found during testing, companies were able to fix the issues. Yet, the data shows that IoT and ICS developers are more likely to have errors in their protocols and code, an indication that their processes are less technically mature. The trend presumably extends to companies that are not regularly using fuzz testing to find issues and will therefore likely have vulnerabilities in their code, Jonathan Knudsen, security strategist with Synopsys, told eWEEK.

      “If you think about ICS, IoT and even healthcare systems, they are used to running on some factory floor or closed environment, so everyone is focused on functionality,” he said. “And then the internet happened and we started putting everything on the global network—exposing these things to the internet means we see a lot of flaws and a lot more threats.” The data suggests that certain industries are less mature and adopt less vetted—likely, newer—protocols.

      For example, the Session Initiation Protocol (SIP) for internet messaging, telephony and video conferencing, however, is less mature. The SIP User Agent Server (UAS) protocol had a 0.3 percent failure rate among more than 100 million tests. 

      While that rate seems low, it means that the tested software failed more 320,000 test cases. By comparison, the address resolution protocol (ARP) is a mature standard and no flaws were found in more than 340,000 tests.

      Fuzz testing only identified likely software issues and typically is unable to determine whether the issues are exploitable. In many cases, the software defects may not truly be a vulnerability. Companies, however, should fix them anyway, Knudsen said.

      “The first question is what are the dangerous ones?” he said. “And what we found over the years is just fix everything. Determining exploitability is hard, and it is time consuming. Even if you don’t think a bug is exploitable, some teenager might find, down the road, a way to exploit it.”

      Overall, as companies mature, they will broaden the focus of their development efforts from creating purely functional code to creating software that has no known defects, Knudsen said.

      “The short game is all about functionality, but the long game is about worrying about whether your product has a security flaw and that could cause reputation damage,” he said. “As with all industries, as they mature, they are becoming more concerned about how they write their software, and that reduces their overall cost and greatly reduces their risk. “

      Robert Lemos
      Robert Lemos
      Robert Lemos is an award-winning journalist who has covered information security, cybercrime and technology's impact on society for almost two decades. A former research engineer, he's written for Ars Technica, CNET, eWEEK, MIT Technology Review, Threatpost and ZDNet. He won the prestigious Sigma Delta Chi award from the Society of Professional Journalists in 2003 for his coverage of the Blaster worm and its impact, and the SANS Institute's Top Cybersecurity Journalists in 2010 and 2014.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.