CVFuzz: Detecting complexity vulnerabilities in OpenCL kernels via automated pathological input generation

W Li, Z Chen, X He, G Duan, J Sun, H Chen - Future Generation Computer …, 2022 - Elsevier
OpenCL programs typically employ complex storage models and diverse data types as well
as manifest various memory access patterns, which make it challenging to detect the …

KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities

B Ruan, J Liu, C Zhang, Z Liang - arXiv preprint arXiv:2404.11107, 2024 - arxiv.org
Linux kernel vulnerability reproduction is a critical task in system security. To reproduce a
kernel vulnerability, the vulnerable environment and the Proof of Concept (PoC) program …

[PDF][PDF] VulHawk: Cross-architecture Vulnerability Detection with Entropy-based Binary Code Search.

Z Luo, P Wang, B Wang, Y Tang, W Xie, X Zhou, D Liu… - NDSS, 2023 - ndss-symposium.org
Code reuse is widespread in software development. It brings a heavy spread of
vulnerabilities, threatening software security. Unfortunately, with the development and …

{KOOBE}: Towards facilitating exploit generation of kernel {Out-Of-Bounds} write vulnerabilities

W Chen, X Zou, G Li, Z Qian - 29th USENIX Security Symposium …, 2020 - usenix.org
The monolithic nature of modern OS kernels leads to a constant stream of bugs being
discovered. It is often unclear which of these bugs are worth fixing, as only a subset of them …

Difuze: Interface aware fuzzing for kernel drivers

J Corina, A Machiry, C Salls, Y Shoshitaishvili… - Proceedings of the …, 2017 - dl.acm.org
Device drivers are an essential part in modern Unix-like systems to handle operations on
physical devices, from hard disks and printers to digital cameras and Bluetooth speakers …

Automated bug detection and replay for COTS linux kernel modules with concolic execution

B Chen, Z Yang, L Lei, K Cong… - 2020 IEEE 27th …, 2020 - ieeexplore.ieee.org
Linux kernel is pervasive in the cloud, on mobile platforms, and on supercomputers. To
support these diverse computing environments, the Linux kernel provides extensibility and …

Clarmor: A dynamic buffer overflow detector for opencl kernels

C Erb, JL Greathouse - Proceedings of the International Workshop on …, 2018 - dl.acm.org
Buffer overflows are a common source of program crashes, data corruption, and security
exploits. While many tools exist to find these issues in CPU programs, buffer overflows are …

UltraVCS: Ultra-fine-grained Variable-based Code Slicing for Automated Vulnerability Detection

T Wu, L Chen, G Du, D Meng… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Detecting vulnerabilities in source code using deep learning models is emerging as a
valuable research area. The key issue in using deep learning to detect vulnerabilities is the …

Unleashing use-before-initialization vulnerabilities in the linux kernel using targeted stack spraying

K Lu, MT Walter, D Pfaff, S Nürnberger, W Lee… - 2017 - publications.cispa.de
A common type of memory error in the Linux kernel is using uninitialized variables
(uninitialized use). Uninitialized uses not only cause undefined behaviors but also impose a …

From release to rebirth: Exploiting thanos objects in Linux kernel

D Liu, P Wang, X Zhou, W Xie, G Zhang… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Vulnerability fixing is time-consuming, hence, not all of the discovered vulnerabilities can be
fixed timely. In reality, developers prioritize vulnerability fixing based on exploitability. Large …