[PDF][PDF] Context-sensitive and directional concurrency fuzzing for data-race detection

ZM Jiang, JJ Bai, K Lu, SM Hu - Network and Distributed Systems …, 2022 - par.nsf.gov
Fuzzing is popular for bug detection and vulnerability discovery nowadays. To adopt fuzzing
for concurrency problems like data races, several recent concurrency fuzzing approaches …

Programmable system call security with ebpf

J Jia, YF Zhu, D Williams, A Arcangeli… - arXiv preprint arXiv …, 2023 - arxiv.org
System call filtering is a widely used security mechanism for protecting a shared OS kernel
against untrusted user applications. However, existing system call filtering techniques either …

Sound and partially-complete static analysis of data-races in gpu programs

D Liew, T Cogumbreiro, J Lange - Proceedings of the ACM on …, 2024 - dl.acm.org
GPUs are progressively being integrated into modern society, playing a pivotal role in
Artificial Intelligence and High-Performance Computing. Programmers need a deep …

Controlled concurrency testing via periodical scheduling

C Wen, M He, B Wu, Z Xu, S Qin - Proceedings of the 44th International …, 2022 - dl.acm.org
Controlled concurrency testing (CCT) techniques have been shown promising for
concurrency bug detection. Their key insight is to control the order in which threads get …

Place your locks well: understanding and detecting lock misuse bugs

Y Cai, P Yao, C Ye, C Zhang - 32nd USENIX Security Symposium …, 2023 - usenix.org
Modern multi-threaded software systems commonly leverage locks to prevent concurrency
bugs. Nevertheless, due to the complexity of writing the correct concurrent code, using locks …

Detecting concurrency memory corruption vulnerabilities

Y Cai, B Zhu, R Meng, H Yun, L He, P Su… - Proceedings of the 2019 …, 2019 - dl.acm.org
Memory corruption vulnerabilities can occur in multithreaded executions, known as
concurrency vulnerabilities in this paper. Due to non-deterministic multithreaded executions …

[PDF][PDF] DDRace: Finding Concurrency UAF Vulnerabilities in Linux Drivers with Directed Fuzzing.

M Yuan, B Zhao, P Li, J Liang, X Han, X Luo… - USENIX Security …, 2023 - usenix.org
Concurrency use-after-free (UAF) vulnerabilities account for a large portion of UAF
vulnerabilities in Linux drivers. Many solutions have been proposed to find either …

Canary: practical static detection of inter-thread value-flow bugs

Y Cai, P Yao, C Zhang - Proceedings of the 42nd ACM SIGPLAN …, 2021 - dl.acm.org
Concurrent programs are still prone to bugs arising from the subtle interleavings of threads.
Traditional static analysis for concurrent programs, such as data-flow analysis and symbolic …

A heuristic framework to detect concurrency vulnerabilities

C Liu, D Zou, P Luo, BB Zhu, H Jin - … of the 34th annual computer security …, 2018 - dl.acm.org
With a growing demand of concurrent software to exploit multi-core hardware capability,
concurrency vulnerabilities have become an inevitable threat to the security of today's IT …

{LR-Miner}: Static Race Detection in {OS} Kernels by Mining Locking Rules

T Li, JJ Bai, GD Han, SM Hu - 33rd USENIX Security Symposium …, 2024 - usenix.org
Data race is one of the most common concurrency issues in OS kernels, and it can cause
severe problems like system crashes and privilege escalation. Therefore, detecting kernel …