Author ORCID Identifier:
Date of Graduation
12-2025
Document Type
Dissertation
Degree Name
Doctor of Philosophy in Computer Science (PhD)
Degree Level
Graduate
Department
Computer Science & Computer Engineering
Advisor/Mentor
Li, Qinghua
Committee Member
Mallampalli, Kamesh
Second Committee Member
Jin, Kevin
Third Committee Member
Pan, Yanjun
Keywords
Fuzzing; Industrial Control Systems
Abstract
Industrial Control Systems (ICS) form the backbone of modern infrastructure, enabling real-time monitoring and automated control in domains such as energy, manufacturing, water treatment, and transportation. These systems, traditionally designed with an emphasis on reliability and safety, are increasingly integrated with information technology (IT) to improve efficiency and flexibility. While this integration has brought operational benefits, it has also exposed ICS environments to cyber threats that exploit software vulnerabilities. Fuzzing, an automated testing technique that feeds large volumes of unexpected or malformed inputs into a program to identify flaws, has emerged as a promising solution for vulnerability discovery. However, applying fuzzing methods designed for IT systems to ICS is challenging. The unique nature of ICS makes traditional fuzzers ineffective in generating test inputs, instrumenting programs, or detecting specialized behaviors, such as silent system crashes. To address the challenges of fuzzing ICS, this work provides strategies for navigating the complex nature of ICS. First, we present a specialized fuzzing framework for industrial control logic programs. This framework focuses on execution models in which PLC programming languages, such as Ladder Logic and Structured Text, are translated into general-purpose languages like C and C++. By targeting this translation layer, the framework can analyze hybrid execution environments that blend domain-specific and general-purpose code, enabling it to handle these complex scenarios effectively. The framework also incorporates a dedicated test case generation engine, ensuring that fuzzing remains both effective and domain-aware for these unique execution models. To further improve the quality of test cases, we design a reinforcement learning–driven fuzzing technique that adaptively learns optimal input mutation strategies. By modeling fuzzing as a Markov Decision Process, this approach enables the fuzzer to select mutations that maximize coverage and bug discovery. While reinforcement learning enhances the efficiency of input mutation, existing fuzzing tools still struggle to generate functionally diverse test cases that meaningfully exercise different aspects of ICS behavior. To fill this gap, this work investigates the use of large language models (LLMs) to generate inputs that are not only structurally valid but also functionally distinct. Finally, to detect silent crashes that escape traditional fuzzing monitoring strategies, we leverage side-channel analysis. Specifically, we analyze electromagnetic (EM) wave signals emitted during program execution, which are collected and statistically analyzed to identify deviations from normal system behavior. Shifts in EM wave patterns serve as reliable indicators of potential crashes or anomalies, even in the absence of explicit error codes or debugging information. In all these endeavors, we conduct several experiments to evaluate the effectiveness of our methods and compare them with existing work. The evaluations demonstrate notable advancements, including over 47 percent more crash detection using our fuzzing framework, up to 43 percent higher coverage with reinforcement learning–enabled mutation strategies, a 35 percent reduction of erroneous test cases using our LLM-based test generation, and 96 percent accuracy in silent crash identification. These results, along with other promising findings, underscore the practical impact and robustness of the proposed methods in advancing ICS fuzzing. Together, these contributions establish a comprehensive foundation for advancing fuzzing in ICS environments.
Citation
Uwibambe, M. (2025). Vulnerability Discovery In Industrial Control Systems Using Fuzzing. Graduate Theses and Dissertations Retrieved from https://scholarworks.uark.edu/etd/6035