{QSYM}: A practical concolic execution engine tailored for hybrid fuzzing

I Yun, S Lee, M Xu, Y Jang, T Kim - 27th USENIX Security Symposium …, 2018 - usenix.org
Recently, hybrid fuzzing has been proposed to address the limitations of fuzzing and
concolic execution by combining both approaches. The hybrid approach has shown its …

Protracer: Towards practical provenance tracing by alternating between logging and tainting

S Ma, X Zhang, D Xu - 23rd Annual Network And …, 2016 - scholarship.libraries.rutgers.edu
ProTracer: towards practical provenance tracing by alternating between logging and
tainting Page 1 Please do not remove this page ProTracer: towards practical provenance …

libdft: Practical dynamic data flow tracking for commodity systems

VP Kemerlis, G Portokalidis, K Jee… - Proceedings of the 8th …, 2012 - dl.acm.org
Dynamic data flow tracking (DFT) deals with tagging and tracking data of interest as they
propagate during program execution. DFT has been repeatedly implemented by a variety of …

[PDF][PDF] High Accuracy Attack Provenance via Binary-based Execution Partition.

KH Lee, X Zhang, D Xu - NDSS, 2013 - ndss-symposium.org
An important aspect of cyber attack forensics is to understand the provenance of suspicious
events, as it discloses the root cause and ramifications of cyber attacks. Traditionally, this is …

MCI: Modeling-based causality inference in audit logging for attack investigation

Y Kwon, F Wang, W Wang… - Network and …, 2018 - scholarship.libraries.rutgers.edu
In this paper, we develop a model based causality inference technique for audit logging that
does not require any application instrumentation or kernel modification. It leverages a recent …

Make it work, make it right, make it fast: building a platform-neutral whole-system dynamic binary analysis platform

A Henderson, A Prakash, LK Yan, X Hu… - Proceedings of the …, 2014 - dl.acm.org
Dynamic binary analysis is a prevalent and indispensable technique in program analysis.
While several dynamic binary analysis tools and frameworks have been proposed, all suffer …

SoK: Using dynamic binary instrumentation for security (and how you may get caught red handed)

DC D'Elia, E Coppa, S Nicchi, F Palmaro… - Proceedings of the 2019 …, 2019 - dl.acm.org
Dynamic binary instrumentation (DBI) techniques allow for monitoring and possibly altering
the execution of a running program up to the instruction level granularity. The ease of use …

{TaintPipe}: Pipelined symbolic taint analysis

J Ming, D Wu, G **ao, J Wang, P Liu - 24th USENIX Security Symposium …, 2015 - usenix.org
Taint analysis has a wide variety of compelling applications in security tasks, from software
attack detection to data lifetime analysis. Static taint analysis propagates taint values …

[PDF][PDF] UIScope: Accurate, Instrumentation-free, and Visible Attack Investigation for GUI Applications.

R Yang, S Ma, H Xu, X Zhang, Y Chen - NDSS, 2020 - ndss-symposium.org
Existing attack investigation solutions for GUI applications suffer from a few limitations such
as inaccuracy (because of the dependence explosion problem), requiring instrumentation …

Accurate, low cost and instrumentation-free security audit logging for windows

S Ma, KH Lee, CH Kim, J Rhee, X Zhang… - Proceedings of the 31st …, 2015 - dl.acm.org
Audit logging is an important approach to cyber attack investigation. However, traditional
audit logging either lacks accuracy or requires expensive and complex binary …