Return-oriented programming without returns

S Checkoway, L Davi, A Dmitrienko… - Proceedings of the 17th …, 2010 - dl.acm.org
We show that on both the x86 and ARM architectures it is possible to mount return-oriented
programming attacks without using return instructions. Our attacks instead make use of …

Privilege escalation attacks on android

L Davi, A Dmitrienko, AR Sadeghi… - Information Security: 13th …, 2011 - Springer
Android is a modern and popular software platform for smartphones. Among its predominant
features is an advanced security model which is based on application-oriented mandatory …

Principles and implementation techniques of software-based fault isolation

G Tan - Foundations and Trends® in Privacy and Security, 2017 - nowpublishers.com
When protecting a computer system, it is often necessary to isolate an untrusted component
into a separate protection domain and provide only controlled interaction between the …

WaVe: a verifiably secure WebAssembly sandboxing runtime

E Johnson, E Laufer, Z Zhao, D Gohman… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
The promise of software sandboxing is flexible, fast and portable isolation; capturing the
benefits of hardwarebased memory protection without requiring operating system …

Droidchecker: analyzing android applications for capability leak

PPF Chan, LCK Hui, SM Yiu - Proceedings of the fifth ACM conference …, 2012 - dl.acm.org
While Apple has checked every app available on the App Store, Google takes another
approach that allows anyone to publish apps on the Android Market. The openness of the …

Private-library-oriented code generation with large language models

D Zan, B Chen, Y Gong, J Cao, F Zhang, B Wu… - arXiv preprint arXiv …, 2023 - arxiv.org
Large language models (LLMs), such as Codex and GPT-4, have recently showcased their
remarkable code generation abilities, facilitating a significant boost in coding efficiency. This …

[PDF][PDF] Favocado: Fuzzing the Binding Code of JavaScript Engines Using Semantically Correct Test Cases.

ST Dinh, H Cho, K Martin, A Oest, K Zeng… - NDSS, 2021 - adamdoupe.com
JavaScript runtime systems include some specialized programming interfaces, called
binding layers. Binding layers translate data representations between JavaScript and unsafe …

A multilanguage static analysis of python programs with native C extensions

R Monat, A Ouadjaout, A Miné - International Static Analysis Symposium, 2021 - Springer
Modern programs are increasingly multilanguage, to benefit from each programming
language's advantages and to reuse libraries. For example, developers may want to …

Detecting cross-language memory management issues in rust

Z Li, J Wang, M Sun, JCS Lui - European Symposium on Research in …, 2022 - Springer
Rust is a promising system-level programming language that can prevent memory
corruption bugs using its strong type system and ownership-based memory management …

On tracking information flows through jni in android applications

C Qian, X Luo, Y Shao… - 2014 44th Annual IEEE …, 2014 - ieeexplore.ieee.org
Android provides native development kit through JNI for developing high-performance
applications (or simply apps). Although recent years have witnessed a considerable …