A messy state of the union: Taming the composite state machines of TLS

B Beurdouche, K Bhargavan… - Communications of the …, 2017 - dl.acm.org
The Transport Layer Security (TLS) protocol supports various authentication modes, key
exchange methods, and protocol extensions. Confusingly, each combination may prescribe …

Checking smart contracts with structural code embedding

Z Gao, L Jiang, X Xia, D Lo… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Smart contracts have been increasingly used together with blockchains to automate
financial and business transactions. However, many bugs and vulnerabilities have been …

Implementing TLS with verified cryptographic security

K Bhargavan, C Fournet, M Kohlweiss… - … IEEE Symposium on …, 2013 - ieeexplore.ieee.org
TLS is possibly the most used protocol for secure communications, with a 18-year history of
flaws and fixes, ranging from its protocol logic to its cryptographic design, and from the …

The state of software for evolutionary biology

D Darriba, T Flouri, A Stamatakis - Molecular biology and …, 2018 - academic.oup.com
Abstract With Next Generation Sequencing data being routinely used, evolutionary biology
is transforming into a computational science. Thus, researchers have to rely on a growing …

Automatically diagnosing and repairing error handling bugs in C

Y Tian, B Ray - Proceedings of the 2017 11th joint meeting on …, 2017 - dl.acm.org
Correct error handling is essential for building reliable and secure systems. Unfortunately,
low-level languages like C often do not support any error handling primitives and leave it up …

How {Double-Fetch} situations turn into {Double-Fetch} vulnerabilities: A study of double fetches in the linux kernel

P Wang, J Krinke, K Lu, G Li… - 26th USENIX Security …, 2017 - usenix.org
We present the first static approach that systematically detects potential double-fetch
vulnerabilities in the Linux kernel. Using a pattern-based analysis, we identified 90 double …

The care and feeding of wild-caught mutants

DB Brown, M Vaughn, B Liblit, T Reps - … of the 2017 11th Joint Meeting …, 2017 - dl.acm.org
Mutation testing of a test suite and a program provides a way to measure the quality of the
test suite. In essence, mutation testing is a form of sensitivity testing: by running mutated …

Automatically detecting error handling bugs using error specifications

S Jana, YJ Kang, S Roth, B Ray - 25th USENIX Security Symposium …, 2016 - usenix.org
Incorrect error handling in security-sensitive code often leads to severe security
vulnerabilities. Implementing correct error handling is repetitive and tedious especially in …

Fuzzing Error Handling Code using {Context-Sensitive} Software Fault Injection

ZM Jiang, JJ Bai, K Lu, SM Hu - 29th USENIX Security Symposium …, 2020 - usenix.org
Error handling code is often critical but difficult to test in reality. As a result, many hard-to-find
bugs exist in error handling code and may cause serious security problems once triggered …

Apex: Automated inference of error specifications for c apis

Y Kang, B Ray, S Jana - Proceedings of the 31st IEEE/ACM International …, 2016 - dl.acm.org
Although correct error handling is crucial to software robustness and security, developers
often inadvertently introduce bugs in error handling code. Moreover, such bugs are hard to …