[PDF][PDF] IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing.

J Chen, W Diao, Q Zhao, C Zuo, Z Lin, XF Wang… - NDSS, 2018 - staff.ie.cuhk.edu.hk
With more IoT devices entering the consumer market, it becomes imperative to detect their
security vulnerabilities before an attacker does. Existing binary analysis based approaches …

[PDF][PDF] 软件与网络安全研究综述

刘剑, 苏璞睿, 杨珉, 和亮, 张源, 朱雪阳, 林惠民 - 软件学报, 2017 - jos.org.cn
互联网已经渗入人类社会的各个方面, 极大地推动了社会进步. 与此同时, 各种形式的网络犯罪,
网络窃密等问题频繁发生, 给社会和国家安全带来了极大的危害. 网络安全已经成为公众和政府 …

Understanding memory and thread safety practices and issues in real-world Rust programs

B Qin, Y Chen, Z Yu, L Song, Y Zhang - Proceedings of the 41st ACM …, 2020 - dl.acm.org
Rust is a young programming language designed for systems software development. It aims
to provide safety guarantees like high-level languages and performance efficiency like low …

Understanding the reproducibility of crowd-reported security vulnerabilities

D Mu, A Cuevas, L Yang, H Hu, X Xing, B Mao… - 27th USENIX Security …, 2018 - usenix.org
Today's software systems are increasingly relying on the “power of the crowd” to identify new
security vulnerabilities. And yet, it is not well understood how reproducible the crowd …

Ankou: Guiding grey-box fuzzing towards combinatorial difference

VJM Manès, S Kim, SK Cha - Proceedings of the ACM/IEEE 42nd …, 2020 - dl.acm.org
Grey-box fuzzing is an evolutionary process, which maintains and evolves a population of
test cases with the help of a fitness function. Fitness functions used by current grey-box …

Software and cyber security-a survey

刘剑, 苏璞睿, 杨珉, 和亮, 张源, 朱雪阳, 林惠民 - Journal of Software, 2017 - jos.org.cn
互联网已经渗入人类社会的各个方面, 极大地推动了社会进步. 与此同时, 各种形式的网络犯罪,
网络窃密等问题频繁发生, 给社会和国家安全带来了极大的危害. 网络安全已经成为公众和政府 …

{AURORA}: Statistical crash analysis for automated root cause explanation

T Blazytko, M Schlögel, C Aschermann… - 29th USENIX Security …, 2020 - usenix.org
Given the huge success of automated software testing techniques, a large amount of
crashes is found in practice. Identifying the root cause of a crash is a time-intensive …

[PDF][PDF] K-Miner: Uncovering Memory Corruption in Linux.

D Gens, S Schmitt, L Davi, AR Sadeghi - NDSS, 2018 - ndss-symposium.org
Operating system kernels are appealing attack targets: compromising the kernel usually
allows attackers to bypass all deployed security mechanisms and take control over the entire …

{PET}: Prevent discovered errors from being triggered in the linux kernel

Z Wang, Y Chen, Q Zeng - 32nd USENIX Security Symposium (USENIX …, 2023 - usenix.org
The Linux kernel is the backbone of modern society. When a kernel error is discovered, a
quick remediation is needed. Whereas sanitizers greatly facilitate root cause diagnosis …

Blankit library debloating: Getting what you want instead of cutting what you don't

C Porter, G Mururu, P Barua, S Pande - Proceedings of the 41st ACM …, 2020 - dl.acm.org
Modern software systems make extensive use of libraries derived from C and C++. Because
of the lack of memory safety in these languages, however, the libraries may suffer from …