Flow2vec: Value-flow-based precise code embedding

Y Sui, X Cheng, G Zhang, H Wang - Proceedings of the ACM on …, 2020 - dl.acm.org
Code embedding, as an emerging paradigm for source code analysis, has attracted much
attention over the past few years. It aims to represent code semantics through distributed …

Selectfuzz: Efficient directed fuzzing with selective path exploration

C Luo, W Meng, P Li - 2023 IEEE Symposium on Security and …, 2023 - ieeexplore.ieee.org
Directed grey-box fuzzers specialize in testing specific target code. They have been applied
to many security applications such as reproducing known crashes and detecting …

Eliminating timing side-channel leaks using program repair

M Wu, S Guo, P Schaumont, C Wang - Proceedings of the 27th ACM …, 2018 - dl.acm.org
We propose a method, based on program analysis and transformation, for eliminating timing
side channels in software code that implements security-critical applications. Our method …

A cocktail approach to practical call graph construction

Y Cai, C Zhang - Proceedings of the ACM on Programming Languages, 2023 - dl.acm.org
After decades of research, constructing call graphs for modern C-based software remains
either imprecise or inefficient when scaling up to the ever-growing complexity. The main …

[PDF][PDF] Unleashing the power of type-based call graph construction by using regional pointer information

Y Cai, Y **, C Zhang - 33nd USENIX Security Symposium (USENIX …, 2024 - usenix.org
When dealing with millions of lines of C code, we still cannot have the cake and eat it: type
analysis for call graph construction is scalable yet highly imprecise. We address this …

Practical Security Analysis of {Zero-Knowledge} Proof Circuits

H Wen, J Stephens, Y Chen, K Ferles… - 33rd USENIX Security …, 2024 - usenix.org
As privacy-sensitive applications based on zero-knowledge proofs (ZKPs) gain increasing
traction, there is a pressing need to detect vulnerabilities in ZKP circuits. This paper studies …

Spatio-temporal context reduction: A pointer-analysis-based static approach for detecting use-after-free vulnerabilities

H Yan, Y Sui, S Chen, J Xue - … of the 40th International Conference on …, 2018 - dl.acm.org
Zero-day Use-After-Free (UAF) vulnerabilities are increasingly popular and highly
dangerous, but few mitigations exist. We introduce a new pointer-analysis-based static …

[PDF][PDF] Refining indirect call targets at the binary level.

SH Kim, C Sun, D Zeng, G Tan - NDSS, 2021 - cse.psu.edu
Enforcing fine-grained Control-Flow Integrity (CFI) is critical for increasing software security.
However, for commercial off-the-shelf (COTS) binaries, constructing highprecision Control …

Bring your own data structures to Datalog

A Sahebolamri, L Barrett, S Moore… - Proceedings of the ACM …, 2023 - dl.acm.org
The restricted logic programming language Datalog has become a popular implementation
target for deductive-analytic workloads including social-media analytics and program …

Better together: Unifying datalog and equality saturation

Y Zhang, YR Wang, O Flatt, D Cao, P Zucker… - Proceedings of the …, 2023 - dl.acm.org
We present egglog, a fixpoint reasoning system that unifies Datalog and equality saturation
(EqSat). Like Datalog, egglog supports efficient incremental execution, cooperating …