Selfpico: Self-guided partial code execution with llms

Z Xue, Z Gao, S Wang, X Hu, X Xia, S Li - Proceedings of the 33rd ACM …, 2024 - dl.acm.org
Code executability plays a vital role in software debugging and testing (eg, detecting runtime
exceptions or assertion violations). However, code execution, especially partial or arbitrary …

Blocking Tracking JavaScript at the Function Granularity

AH Amjad, S Munir, Z Shafiq, MA Gulzar - … of the 2024 on ACM SIGSAC …, 2024 - dl.acm.org
Modern websites extensively rely on JavaScript to implement both functionality and tracking.
Existing privacy-enhancing content-blocking tools struggle against mixed scripts, which …

ωTest: WebView-Oriented Testing for Android Applications

J Hu, L Wei, Y Liu, SC Cheung - Proceedings of the 32nd ACM SIGSOFT …, 2023 - dl.acm.org
WebView is a UI widget that helps integrate web applications into the native context of
Android apps. It provides powerful mechanisms for bi-directional interactions between the …

Pmp: Cost-effective forced execution with probabilistic memory pre-planning

W You, Z Zhang, Y Kwon, Y Aafer… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Malware is a prominent security threat and exposing malware behavior is a critical
challenge. Recent malware often has payload that is only released when certain conditions …

Rotten apples spoil the bunch: An anatomy of Google Play malware

M Cao, K Ahmed, J Rubin - … of the 44th International Conference on …, 2022 - dl.acm.org
This paper provides an in-depth analysis of Android malware that bypassed the strictest
defenses of the Google Play application store and penetrated the official Android market …

Whatcha Lookin'At: Investigating Third-Party Web Content in Popular Android Apps

D Kuchhal, K Ramakrishnan, F Li - Proceedings of the 2024 ACM on …, 2024 - dl.acm.org
Over 65% of web traffic originates from mobile devices. However, much of this traffic is not
from mobile web browsers but rather from mobile apps displaying web content. Android's …

ARCTURUS: Full Coverage Binary Similarity Analysis with Reachability-guided Emulation

A Zhou, Y Hu, X Xu, C Zhang - ACM Transactions on Software …, 2024 - dl.acm.org
Binary code similarity analysis is extremely useful, since it provides rich information about an
unknown binary, such as revealing its functionality and identifying reused libraries. Robust …

Define-Use Guided Path Exploration for Better Forced Execution

D He, D Xie, Y Wang, W You, B Liang… - Proceedings of the 33rd …, 2024 - dl.acm.org
The evolution of recent malware, characterized by the escalating use of cloaking techniques,
poses a significant challenge in the analysis of malware behaviors. Researchers proposed …

A Packet Content-Oriented Remote Code Execution Attack Payload Detection Model

E Sun, J Han, Y Li, C Huang - Future Internet, 2024 - mdpi.com
In recent years, various Remote Code Execution vulnerabilities on the Internet have been
exposed frequently; thus, more and more security researchers have begun to pay attention …

[PDF][PDF] Building Trust In The Online Ecosystem Through Empirical Evaluations Of Web Security And Privacy Concerns

D Kuchhal - 2023 - dhruvkuchhal.com
First and foremost, I want to express my deepest gratitude to my advisor, Frank Li, for his
exemplary mentorship, endless patience, and steadfast support throughout my Ph. D …