Difuzzrtl: Differential fuzz testing to find cpu bugs

J Hur, S Song, D Kwon, E Baek, J Kim… - 2021 IEEE Symposium …, 2021 - ieeexplore.ieee.org
Security bugs in CPUs have critical security impacts to all the computation related hardware
and software components as it is the core of the computation. In spite of the fact that …

Where does it go? refining indirect-call targets with multi-layer type analysis

K Lu, H Hu - Proceedings of the 2019 ACM SIGSAC Conference on …, 2019 - dl.acm.org
System software commonly uses indirect calls to realize dynamic program behaviors.
However, indirect-calls also bring challenges to constructing a precise control-flow graph …

Fuzzing file systems via two-dimensional input space exploration

W Xu, H Moon, S Kashyap, PN Tseng… - 2019 IEEE Symposium …, 2019 - ieeexplore.ieee.org
File systems, a basic building block of an OS, are too big and too complex to be bug free.
Nevertheless, file systems rely on regular stress-testing tools and formal checkers to find …

[PDF][PDF] Enforcing Kernel Security Invariants with Data Flow Integrity.

C Song, B Lee, K Lu, W Harris, T Kim, W Lee - NDSS, 2016 - researchgate.net
The operation system kernel is the foundation of the whole system and is often the de facto
trusted computing base for many higher level security mechanisms. Unfortunately, kernel …

Finding semantic bugs in file systems with an extensible fuzzing framework

S Kim, M Xu, S Kashyap, J Yoon, W Xu… - Proceedings of the 27th …, 2019 - dl.acm.org
File systems are too large to be bug free. Although handwritten test suites have been widely
used to stress file systems, they can hardly keep up with the rapid increase in file system …

{AGAMOTTO}: How Persistent is your Persistent Memory Application?

I Neal, B Reeves, B Stoler, A Quinn, Y Kwon… - … USENIX Symposium on …, 2020 - usenix.org
Persistent Memory (PM) can be used by applications to directly and quickly persist any data
structure, without the overhead of a file system. However, writing PM applications that are …

{SPEICHER}: Securing {LSM-based}{Key-Value} Stores using Shielded Execution

M Bailleu, J Thalheim, P Bhatotia, C Fetzer… - … USENIX Conference on …, 2019 - usenix.org
We introduce Speicher, a secure storage system that not only provides strong confidentiality
and integrity properties, but also ensures data freshness to protect against rollback/forking …

Detecting {Missing-Check} bugs via semantic-and {Context-Aware} criticalness and constraints inferences

K Lu, A Pakki, Q Wu - … USENIX Security Symposium (USENIX Security 19 …, 2019 - usenix.org
Missing a security check is a class of semantic bugs in software programs where erroneous
execution states are not validated. Missing-check bugs are particularly common in OS …

Witcher: Systematic crash consistency testing for non-volatile memory key-value stores

X Fu, WH Kim, AP Shreepathi, M Ismail… - Proceedings of the …, 2021 - dl.acm.org
The advent of non-volatile main memory (NVM) enables the development of crash-
consistent software without paying storage stack overhead. However, building a correct …

Code vectors: Understanding programs through embedded abstracted symbolic traces

J Henkel, SK Lahiri, B Liblit, T Reps - Proceedings of the 2018 26th ACM …, 2018 - dl.acm.org
With the rise of machine learning, there is a great deal of interest in treating programs as
data to be fed to learning algorithms. However, programs do not start off in a form that is …