FUZZOLIC: mixing fuzzing and concolic execution

L Borzacchiello, E Coppa, C Demetrescu - Computers & Security, 2021 - Elsevier
In the last few years, a large variety of approaches and methodologies have been explored
in the context of software testing, ranging from black-box techniques, such as fuzzing, to …

Understanding and detecting software upgrade failures in distributed systems

Y Zhang, J Yang, Z Jin, U Sethi, K Rodrigues… - Proceedings of the …, 2021 - dl.acm.org
Upgrade is one of the most disruptive yet unavoidable maintenance tasks that undermine
the availability of distributed systems. Any failure during an upgrade is catastrophic, as it …

[HTML][HTML] Ai system engineering—key challenges and lessons learned

L Fischer, L Ehrlinger, V Geist, R Ramler… - Machine Learning and …, 2020 - mdpi.com
The main challenges are discussed together with the lessons learned from past and
ongoing research along the development cycle of machine learning systems. This will be …

Ct-wasm: type-driven secure cryptography for the web ecosystem

C Watt, J Renner, N Popescu, S Cauligi… - Proceedings of the ACM …, 2019 - dl.acm.org
A significant amount of both client and server-side cryptography is implemented in
JavaScript. Despite widespread concerns about its security, no other language has been …

CaSym: Cache aware symbolic execution for side channel detection and mitigation

R Brotzman, S Liu, D Zhang, G Tan… - 2019 IEEE Symposium …, 2019 - ieeexplore.ieee.org
Cache-based side channels are becoming an important attack vector through which secret
information can be leaked to malicious parties. implementations and Previous work on …

An inside look into the practice of malware analysis

M Yong Wong, M Landen, M Antonakakis… - Proceedings of the …, 2021 - dl.acm.org
Malware analysis aims to understand how malicious software carries out actions necessary
for a successful attack and identify the possible impacts of the attack. While there has been …

Academic source code plagiarism detection by measuring program behavioral similarity

H Cheers, Y Lin, SP Smith - IEEE Access, 2021 - ieeexplore.ieee.org
Source code plagiarism is a long-standing issue in tertiary computer science education.
Many source code plagiarism detection tools have been proposed to aid in the detection of …

Demystify the fuzzing methods: A comprehensive survey

S Mallissery, YS Wu - ACM Computing Surveys, 2023 - dl.acm.org
Massive software applications possess complex data structures or parse complex data
structures; in such cases, vulnerabilities in the software become inevitable. The …

Jn-saf: Precise and efficient ndk/jni-aware inter-language static analysis framework for security vetting of android applications with native code

F Wei, X Lin, X Ou, T Chen, X Zhang - Proceedings of the 2018 ACM …, 2018 - dl.acm.org
Android allows application developers to use native language (C/C++) to implement a part
or the complete program. Recent research and our own statistics show that native payloads …

Live functional programming with typed holes

C Omar, I Voysey, R Chugh, MA Hammer - Proceedings of the ACM on …, 2019 - dl.acm.org
Live programming environments aim to provide programmers (and sometimes audiences)
with continuous feedback about a program's dynamic behavior as it is being edited. The …