Review of cyberattack implementation, detection, and mitigation methods in cyber-physical systems

N Mtukushe, AK Onaolapo, A Aluko, DG Dorrell - Energies, 2023 - mdpi.com
With the rapid proliferation of cyber-physical systems (CPSs) in various sectors, including
critical infrastructure, transportation, healthcare, and the energy industry, there is a pressing …

Examining zero-shot vulnerability repair with large language models

H Pearce, B Tan, B Ahmad, R Karri… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Human developers can produce code with cybersecurity bugs. Can emerging 'smart'code
completion tools help repair those bugs? In this work, we examine the use of large language …

The role of machine learning in cybersecurity

G Apruzzese, P Laskov, E Montes de Oca… - … Threats: Research and …, 2023 - dl.acm.org
Machine Learning (ML) represents a pivotal technology for current and future information
systems, and many domains already leverage the capabilities of ML. However, deployment …

Space odyssey: An experimental software security analysis of satellites

J Willbold, M Schloegel, M Vögele… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Satellites are an essential aspect of our modern society and have contributed significantly to
the way we live today, most notable through modern telecommunications, global positioning …

Automated bug hunting with data-driven symbolic root cause analysis

C Yagemann, SP Chung, B Saltaformaggio… - Proceedings of the 2021 …, 2021 - dl.acm.org
The increasing cost of successful cyberattacks has caused a mindset shift, whereby
defenders now employ proactive defenses, namely software bug hunting, alongside existing …

NCScope: hardware-assisted analyzer for native code in Android apps

H Zhou, S Wu, X Luo, T Wang, Y Zhou… - Proceedings of the 31st …, 2022 - dl.acm.org
More and more Android apps implement their functionalities in native code, so does
malware. Although various approaches have been designed to analyze the native code …

{PUMM}: Preventing {Use-After-Free} Using Execution Unit Partitioning

C Yagemann, SP Chung, B Saltaformaggio… - 32nd USENIX Security …, 2023 - usenix.org
Critical software is written in memory unsafe languages that are vulnerable to use-after-free
and double free bugs. This has led to proposals to secure memory allocators by strategically …

Palantír: Optimizing attack provenance with hardware-enhanced system observability

J Zeng, C Zhang, Z Liang - Proceedings of the 2022 ACM SIGSAC …, 2022 - dl.acm.org
System auditing is the foundation of attack provenance to investigate root causes and
ramifications of cyber-attacks. However, provenance tracking on coarse-grained audit logs …

Crashtalk: Automated generation of precise, human readable, descriptions of software security bugs

K James, K Valakuzhy, K Snow… - Proceedings of the …, 2024 - dl.acm.org
Understanding the cause, consequences, and severity of a security bug are critical facets of
the overall bug triaging and remediation process. Unfortunately, diagnosing failures is often …

Exploring the Limits of ChatGPT in Software Security Applications

F Wu, Q Zhang, AP Bajaj, T Bao, N Zhang… - arXiv preprint arXiv …, 2023 - arxiv.org
Large language models (LLMs) have undergone rapid evolution and achieved remarkable
results in recent times. OpenAI's ChatGPT, backed by GPT-3.5 or GPT-4, has gained instant …