Automated assessment in computer science education: A state-of-the-art review

JC Paiva, JP Leal, Á Figueira - ACM Transactions on Computing …, 2022 - dl.acm.org
Practical programming competencies are critical to the success in computer science (CS)
education and go-to-market of fresh graduates. Acquiring the required level of skills is a long …

Survey of machine learning techniques for malware analysis

D Ucci, L Aniello, R Baldoni - Computers & Security, 2019 - Elsevier
Coping with malware is getting more and more challenging, given their relentless growth in
complexity and volume. One of the most common approaches in literature is using machine …

{AFL++}: Combining incremental steps of fuzzing research

A Fioraldi, D Maier, H Eißfeldt, M Heuse - 14th USENIX Workshop on …, 2020 - usenix.org
In this paper, we present AFL++, a community-driven open-source tool that incorporates
state-of-the-art fuzzing research, to make the research comparable, reproducible …

Manticore: A user-friendly symbolic execution framework for binaries and smart contracts

M Mossberg, F Manzano, E Hennenfent… - 2019 34th IEEE/ACM …, 2019 - ieeexplore.ieee.org
An effective way to maximize code coverage in software tests is through dynamic symbolic
execution-a technique that uses constraint solving to systematically explore a program's …

Deepct: Tomographic combinatorial testing for deep learning systems

L Ma, F Juefei-Xu, M Xue, B Li, L Li… - 2019 IEEE 26th …, 2019 - ieeexplore.ieee.org
Deep learning (DL) has achieved remarkable progress over the past decade and has been
widely applied to many industry domains. However, the robustness of DL systems recently …

[PDF][PDF] HFL: Hybrid Fuzzing on the Linux Kernel.

K Kim, DR Jeong, CH Kim, Y Jang, I Shin, B Lee - NDSS, 2020 - lifeasageek.github.io
Hybrid fuzzing, combining symbolic execution and fuzzing, is a promising approach for
vulnerability discovery because each approach can complement the other. However, we …

On the suitability of blockchain platforms for IoT applications: Architectures, security, privacy, and performance

S Brotsis, K Limniotis, G Bendiab, N Kolokotronis… - Computer Networks, 2021 - Elsevier
Blockchain and distributed ledger technologies have received significant interest in various
areas beyond the financial sector, with profound applications in the Internet of Things (IoT) …

Fuzzing of embedded systems: A survey

J Yun, F Rustamov, J Kim, Y Shin - ACM Computing Surveys, 2022 - dl.acm.org
Security attacks abuse software vulnerabilities of IoT devices; hence, detecting and
eliminating these vulnerabilities immediately are crucial. Fuzzing is an efficient method to …

Empirical evaluation of smart contract testing: What is the best choice?

M Ren, Z Yin, F Ma, Z Xu, Y Jiang, C Sun, H Li… - Proceedings of the 30th …, 2021 - dl.acm.org
Security of smart contracts has attracted increasing attention in recent years. Many
researchers have devoted themselves to devising testing tools for vulnerability detection …

{SmarTest}: Effectively hunting vulnerable transaction sequences in smart contracts through language {Model-Guided} symbolic execution

S So, S Hong, H Oh - … USENIX Security Symposium (USENIX Security 21 …, 2021 - usenix.org
We present SmarTest, a novel symbolic execution technique for effectively hunting
vulnerable transaction sequences in smart contracts. Because smart contracts are stateful …