Program analysis of commodity IoT applications for security and privacy: Challenges and opportunities

ZB Celik, E Fernandes, E Pauley, G Tan… - ACM Computing …, 2019 - dl.acm.org
Recent advances in Internet of Things (IoT) have enabled myriad domains such as smart
homes, personal monitoring devices, and enhanced manufacturing. IoT is now pervasive …

Empirical evaluation of smart contract testing: What is the best choice?

M Ren, Z Yin, F Ma, Z Xu, Y Jiang, C Sun, H Li… - Proceedings of the 30th …, 2021 - dl.acm.org
Security of smart contracts has attracted increasing attention in recent years. Many
researchers have devoted themselves to devising testing tools for vulnerability detection …

Nuances are the key: Unlocking chatgpt to find failure-inducing tests with differential prompting

TO Li, W Zong, Y Wang, H Tian, Y Wang… - 2023 38th IEEE/ACM …, 2023 - ieeexplore.ieee.org
Automated detection of software failures is an important but challenging software
engineering task. It involves finding in a vast search space the failure-inducing test cases …

MirChecker: detecting bugs in Rust programs via static analysis

Z Li, J Wang, M Sun, JCS Lui - Proceedings of the 2021 ACM SIGSAC …, 2021 - dl.acm.org
Safe system programming is often a crucial requirement due to its critical role in system
software engineering. Conventional low-level programming languages such as C and …

Binary code summarization: Benchmarking chatgpt/gpt-4 and other large language models

X Jin, J Larson, W Yang, Z Lin - arXiv preprint arXiv:2312.09601, 2023 - arxiv.org
Binary code summarization, while invaluable for understanding code semantics, is
challenging due to its labor-intensive nature. This study delves into the potential of large …

SymQEMU: Compilation-based symbolic execution for binaries

S Poeplau, A Francillon - NDSS 2021, Network and Distributed System …, 2021 - hal.science
Symbolic execution is a powerful technique for software analysis and bug detection.
Compilation-based symbolic execution is a recently proposed flavor that has been shown to …

Code-Aware Prompting: A Study of Coverage-Guided Test Generation in Regression Setting using LLM

G Ryan, S Jain, M Shang, S Wang, X Ma… - Proceedings of the …, 2024 - dl.acm.org
Testing plays a pivotal role in ensuring software quality, yet conventional Search Based
Software Testing (SBST) methods often struggle with complex software units, achieving …

Scaling symbolic evaluation for automated verification of systems code with Serval

L Nelson, J Bornholt, R Gu, A Baumann… - Proceedings of the 27th …, 2019 - dl.acm.org
This paper presents Serval, a framework for developing automated verifiers for systems
software. Serval provides an extensible infrastructure for creating verifiers by lifting …

Challenges in firmware re-hosting, emulation, and analysis

C Wright, WA Moeglein, S Bagchi, M Kulkarni… - ACM Computing …, 2021 - dl.acm.org
System emulation and firmware re-hosting have become popular techniques to answer
various security and performance related questions, such as determining whether a …

Automatic vulnerability detection in embedded devices and firmware: Survey and layered taxonomies

A Qasem, P Shirani, M Debbabi, L Wang… - ACM Computing …, 2021 - dl.acm.org
In the era of the internet of things (IoT), software-enabled inter-connected devices are of
paramount importance. The embedded systems are very frequently used in both security …