Slowfuzz: Automated domain-independent detection of algorithmic complexity vulnerabilities

T Petsios, J Zhao, AD Keromytis, S Jana - Proceedings of the 2017 ACM …, 2017 - dl.acm.org
Algorithmic complexity vulnerabilities occur when the worst-case time/space complexity of
an application is significantly higher than the respective average case for particular user …

Sok: Introspections on trust and the semantic gap

B Jain, MB Baig, D Zhang, DE Porter… - 2014 IEEE symposium …, 2014 - ieeexplore.ieee.org
An essential goal of Virtual Machine Introspection (VMI) is assuring security policy
enforcement and overall functionality in the presence of an untrustworthy OS. A fundamental …

Attacking the brain: Races in the {SDN} control plane

L Xu, J Huang, S Hong, J Zhang, G Gu - 26th USENIX Security …, 2017 - usenix.org
Software-Defined Networking (SDN) has significantly enriched network functionalities by
decoupling programmable network controllers from the network hardware. Because SDN …

Performance modeling and analysis of network firewalls

K Salah, K Elbadawi, R Boutaba - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
Network firewalls act as the first line of defense against unwanted and malicious traffic
targeting Internet servers. Predicting the overall firewall performance is crucial to network …

How {Double-Fetch} situations turn into {Double-Fetch} vulnerabilities: A study of double fetches in the linux kernel

P Wang, J Krinke, K Lu, G Li… - 26th USENIX Security …, 2017 - usenix.org
We present the first static approach that systematically detects potential double-fetch
vulnerabilities in the Linux kernel. Using a pattern-based analysis, we identified 90 double …

Operating system transactions

DE Porter, OS Hofmann, CJ Rossbach, A Benn… - Proceedings of the …, 2009 - dl.acm.org
Applications must be able to synchronize accesses to operating system resources in order to
ensure correctness in the face of concurrency and system failures. System transactions …

A study of modern linux api usage and compatibility: What to support when you're supporting

CC Tsai, B Jain, NA Abdul, DE Porter - Proceedings of the Eleventh …, 2016 - dl.acm.org
This paper presents a study of Linux API usage across all applications and libraries in the
Ubuntu Linux 15.04 distribution. We propose metrics for reasoning about the importance of …

Automated detection, exploitation, and elimination of double-fetch bugs using modern cpu features

M Schwarz, D Gruss, M Lipp, C Maurice… - Proceedings of the …, 2018 - dl.acm.org
Double-fetch bugs are a special type of race condition, where an unprivileged execution
thread is able to change a memory location between the time-of-check and time-of-use of a …

Bloom filters, adaptivity, and the dictionary problem

MA Bender, M Farach-Colton… - 2018 IEEE 59th …, 2018 - ieeexplore.ieee.org
An approximate membership query data structure (AMQ)-such as a Bloom, quotient, or
cuckoo filter-maintains a compact, probabilistic representation of a set S of keys from a …

Singularity: Pattern fuzzing for worst case complexity

J Wei, J Chen, Y Feng, K Ferles, I Dillig - … of the 2018 26th ACM Joint …, 2018 - dl.acm.org
We describe a new blackbox complexity testing technique for determining the worst-case
asymptotic complexity of a given application. The key idea is to look for an input pattern …