Accounting and billing for federated cloud infrastructures

E Elmroth, FG Marquez, D Henriksson… - … Conference on Grid …, 2009 - ieeexplore.ieee.org
Emerging Cloud computing infrastructures provide computing resources on demand based
on postpaid principles. For example, the RESERVOIR project develops an infrastructure …

Finding software vulnerabilities by smart fuzzing

S Bekrar, C Bekrar, R Groz… - 2011 Fourth IEEE …, 2011 - ieeexplore.ieee.org
Nowadays, one of the most effective ways to identify software vulnerabilities by testing is the
use of fuzzing, whereby the robustness of software is tested against invalid inputs that play …

Unicorefuzz: On the viability of emulation for kernelspace fuzzing

D Maier, B Radtke, B Harren - 13th USENIX Workshop on Offensive …, 2019 - usenix.org
Fuzzing uncovers an ever-growing number of critical vulnerabilities. Despite the simple
concept—execute the target until it crashes—setting up fuzz tests can pose complex …

{FreeWill}: Automatically Diagnosing Use-after-free Bugs via Reference Miscounting Detection on Binaries

L He, H Hu, P Su, Y Cai, Z Liang - 31st USENIX Security Symposium …, 2022 - usenix.org
Memory-safety issues in operating systems and popular applications are still top security
threats. As one widely exploited vulnerability, Use After Free (UAF) resulted in hundreds of …

Vulnerability detection systems: Think cyborg, not robot

S Heelan - IEEE Security & Privacy, 2011 - ieeexplore.ieee.org
This paper discussed why academic research has failed to create effective vulnerability
detection software and offer some suggestions on how we can reap practical benefits from …

Automated exploit generation for stack buffer overflow vulnerabilities

VA Padaryan, VV Kaushan, AN Fedotov - Programming and Computer …, 2015 - Springer
An automated method for exploit generation is presented. This method allows one to
construct exploits for stack buffer overflow vulnerabilities and to prioritize software bugs. The …

Unconstrained motion compensated temporal filtering (UMCTF) framework for wavelet video coding

M van der Schaar, DS Turaga - 2003 International Conference …, 2003 - ieeexplore.ieee.org
This paper presents a new framework for adaptive temporal filtering in wavelet interframe
codecs, called the unconstrained motion compensated temporal filtering (UMCTF). This …

Exniffer: Learning to prioritize crashes by assessing the exploitability from memory dump

S Tripathi, G Grieco, S Rawat - 2017 24th Asia-Pacific Software …, 2017 - ieeexplore.ieee.org
An important component of software reliability is the assurance of certain security
guarantees, such as absence of low-level bugs that may result in code exploitation, for …

Automated crash filtering using interprocedural static analysis for binary codes

HG Jeon, SK Mok, ES Cho - 2017 IEEE 41st Annual Computer …, 2017 - ieeexplore.ieee.org
This paper introduces a static binary analysis tool called CrashFilter, which classifies the
crashes arisen during the test, according to the risk levels. It has advantages in accuracy …

Analysis to heap overflow exploit in linux with symbolic execution

N Huang, S Huang, C Chang - IOP Conference Series: Earth and …, 2019 - iopscience.iop.org
Heap overflow is a common error of buffer overflow in Linux. The control flow of a program
may be hijacked when the program satisfies several specific conditions. The existing …