J Yu, X Lin, X Xing - arXiv preprint arXiv:2309.10253, 2023 - arxiv.org
Large language models (LLMs) have recently experienced tremendous popularity and are widely used from casual conversations to AI-driven programming. However, despite their …
F Gorter, E Barberis, R Isemann… - 32nd USENIX Security …, 2023 - usenix.org
Memory sanitizers are powerful tools to detect spatial and temporal memory errors, such as buffer overflows and use-after-frees. Fuzzers and software testers often rely on these tools to …
Spatial memory errors such as buffer overflows still rank among the top vulnerabilities in C/C++ programs. Despite much research in the area, the performance overhead of (even …
X Zhao, C Yang, Z Jia, Y Wang, J Ma - Computers & Security, 2023 - Elsevier
Multiple base fuzzers collaborate as a fuzzer combination. Fuzzer combinations have been proven to perform more robustly and efficiently when fuzzing complicated real-world …
Uncovering bugs in concurrent programs is a challenging problem owing to the exponentially large search space of thread interleavings. Past approaches towards …
Software security continues to be a critical concern for programs implemented in low-level programming languages such as C and C++. Many defenses have been proposed in the …
JJ Bai, HX Song, SM Hu - Proceedings of the 29th ACM International …, 2024 - dl.acm.org
An increasing number of robotic programs are implemented based on Robot Operating System (ROS), which provides many practical tools and libraries for robot development. To …
Although numerous dynamic testing techniques have been developed, they can hardly be directly applied to firmware of deeply embedded (eg, microcontroller-based) devices due to …