Flow2vec: Value-flow-based precise code embedding
Code embedding, as an emerging paradigm for source code analysis, has attracted much
attention over the past few years. It aims to represent code semantics through distributed …
attention over the past few years. It aims to represent code semantics through distributed …
Selectfuzz: Efficient directed fuzzing with selective path exploration
Directed grey-box fuzzers specialize in testing specific target code. They have been applied
to many security applications such as reproducing known crashes and detecting …
to many security applications such as reproducing known crashes and detecting …
Eliminating timing side-channel leaks using program repair
We propose a method, based on program analysis and transformation, for eliminating timing
side channels in software code that implements security-critical applications. Our method …
side channels in software code that implements security-critical applications. Our method …
A cocktail approach to practical call graph construction
After decades of research, constructing call graphs for modern C-based software remains
either imprecise or inefficient when scaling up to the ever-growing complexity. The main …
either imprecise or inefficient when scaling up to the ever-growing complexity. The main …
[PDF][PDF] Unleashing the power of type-based call graph construction by using regional pointer information
When dealing with millions of lines of C code, we still cannot have the cake and eat it: type
analysis for call graph construction is scalable yet highly imprecise. We address this …
analysis for call graph construction is scalable yet highly imprecise. We address this …
Practical Security Analysis of {Zero-Knowledge} Proof Circuits
As privacy-sensitive applications based on zero-knowledge proofs (ZKPs) gain increasing
traction, there is a pressing need to detect vulnerabilities in ZKP circuits. This paper studies …
traction, there is a pressing need to detect vulnerabilities in ZKP circuits. This paper studies …
Spatio-temporal context reduction: A pointer-analysis-based static approach for detecting use-after-free vulnerabilities
Zero-day Use-After-Free (UAF) vulnerabilities are increasingly popular and highly
dangerous, but few mitigations exist. We introduce a new pointer-analysis-based static …
dangerous, but few mitigations exist. We introduce a new pointer-analysis-based static …
[PDF][PDF] Refining indirect call targets at the binary level.
Enforcing fine-grained Control-Flow Integrity (CFI) is critical for increasing software security.
However, for commercial off-the-shelf (COTS) binaries, constructing highprecision Control …
However, for commercial off-the-shelf (COTS) binaries, constructing highprecision Control …
Bring your own data structures to Datalog
The restricted logic programming language Datalog has become a popular implementation
target for deductive-analytic workloads including social-media analytics and program …
target for deductive-analytic workloads including social-media analytics and program …
Better together: Unifying datalog and equality saturation
We present egglog, a fixpoint reasoning system that unifies Datalog and equality saturation
(EqSat). Like Datalog, egglog supports efficient incremental execution, cooperating …
(EqSat). Like Datalog, egglog supports efficient incremental execution, cooperating …