Research Article
Discovering Vulnerabilities in COTS IoT Devices through Blackbox Fuzzing Web Management Interface
Algorithm 2
WMIFuzzer fuzz scheduling algorithm.
| Input: the set of generated WMPT, M; | (1) | for each do | (2) | for each node do | (3) | if β is a leaf node then | (4) | = sequentia_mutating(β) | (5) | = sending_monitoring() | (6) | if interesting() then | (7) | alert() | (8) | end if | (9) | end if | (10) | end for | (11) | end for | (12) | loop | (13) | for each do | (14) | = randomIndexList(0, len(α)) | (15) | for each do | (16) | = random_mutating(λ) | (17) | end for | (18) | = sending_monitoring() | (19) | if interesting(result) then | (20) | alert() | (21) | end if | (22) | end for | (23) | end loop |
|