PatchScope: Memory object centric patch diffing

L Zhao, Y Zhu, J Ming, Y Zhang, H Zhang… - Proceedings of the 2020 …, 2020 - dl.acm.org
Software patching is one of the most significant mechanisms to combat vulnerabilities. To
demystify underlying patch details, the techniques of patch differential analysis (aka patch …

Enbindiff: Identifying data-only patches for binaries

J Lin, D Wang, R Chang, L Wu… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
In this article, we focus on data-only patches, a specific type of security patches not incurring
any structural changes. As one of the most significant causes leading to false negatives …

Pdiff: Semantic-based patch presence testing for downstream kernels

Z Jiang, Y Zhang, J Xu, Q Wen, Z Wang… - Proceedings of the …, 2020 - dl.acm.org
Open-source kernels have been adopted by massive downstream vendors on billions of
devices. However, these vendors often omit or delay the adoption of patches released in the …

Just-in-Time Security Patch Detection--LLM At the Rescue for Data Augmentation

X Tang, Z Chen, K Kim, H Tian, S Ezzini… - arXiv preprint arXiv …, 2023 - arxiv.org
In the face of growing vulnerabilities found in open-source software, the need to identify
{discreet} security patches has become paramount. The lack of consistency in how software …

Ghost patches: Fake patches for fake vulnerabilities

J Avery, EH Spafford - ICT Systems Security and Privacy Protection: 32nd …, 2017 - Springer
Offensive and defensive players in the cyber security sphere constantly react to either party's
actions. This reactive approach works well for attackers but can be devastating for …

Patchdb: A large-scale security patch dataset

X Wang, S Wang, P Feng, K Sun… - 2021 51st Annual IEEE …, 2021 - ieeexplore.ieee.org
Security patches, embedding both vulnerable code and the corresponding fixes, are of great
significance to vulnerability detection and software maintenance. However, the existing …

Credal: Towards locating a memory corruption vulnerability with your core dump

J Xu, D Mu, P Chen, X Xing, P Wang, P Liu - Proceedings of the 2016 …, 2016 - dl.acm.org
After a program has crashed and terminated abnormally, it typically leaves behind a
snapshot of its crashing state in the form of a core dump. While a core dump carries a large …

Patch-related vulnerability detection based on symbolic execution

W Qiang, Y Liao, G Sun, LT Yang, D Zou, H Jin - IEEE Access, 2017 - ieeexplore.ieee.org
During the lifecycle of a software system, software patches are committed to software
repositories to fix discovered bugs or append new features. Unfortunately, the patches may …

Multilevel semantic embedding of software patches: a fine-to-coarse grained approach towards security patch detection

X Tang, S Ezzini, H Tian, Y Song, J Klein… - arXiv preprint arXiv …, 2023 - arxiv.org
The growth of open-source software has increased the risk of hidden vulnerabilities that can
affect downstream software applications. This concern is further exacerbated by software …

Automated bug hunting with data-driven symbolic root cause analysis

C Yagemann, SP Chung, B Saltaformaggio… - Proceedings of the 2021 …, 2021 - dl.acm.org
The increasing cost of successful cyberattacks has caused a mindset shift, whereby
defenders now employ proactive defenses, namely software bug hunting, alongside existing …