Research Article

Discovering Vulnerabilities in COTS IoT Devices through Blackbox Fuzzing Web Management Interface

Algorithm 2

WMIFuzzer fuzz scheduling algorithm.
Input: the set of generated WMPT, M;
(1)for each do
(2)  for each node do
(3)   if β is a leaf node then
(4)     = sequentia_mutating(β)
(5)     = sending_monitoring()
(6)    if interesting() then
(7)     alert()
(8)    end if
(9)   end if
(10)  end for
(11)end for
(12)loop
(13)  for each do
(14)    = randomIndexList(0, len(α))
(15)   for each do
(16)     = random_mutating(λ)
(17)   end for
(18)    = sending_monitoring()
(19)   if interesting(result) then
(20)    alert()
(21)   end if
(22)  end for
(23)end loop