Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Enhancing static analysis for practical bug detection: An llm-integrated approach
While static analysis is instrumental in uncovering software bugs, its precision in analyzing
large and intricate codebases remains challenging. The emerging prowess of Large …
large and intricate codebases remains challenging. The emerging prowess of Large …
Sok: Runtime integrity
This paper provides a systematic exploration of Control Flow Integrity (CFI) and Control Flow
Attestation (CFA) mechanisms, examining their differences and relationships. It addresses …
Attestation (CFA) mechanisms, examining their differences and relationships. It addresses …
The Hitchhiker's Guide to Program Analysis: A Journey with Large Language Models
Static analysis is a widely used technique in software engineering for identifying and
mitigating bugs. However, a significant hurdle lies in achieving a delicate balance between …
mitigating bugs. However, a significant hurdle lies in achieving a delicate balance between …
Sok: Integrity, attestation, and auditing of program execution
This paper provides a systematic exploration of Control Flow Integrity (CFI) and Control Flow
Attestation (CFA) mechanisms, examining their differences and relationships. It addresses …
Attestation (CFA) mechanisms, examining their differences and relationships. It addresses …
{DAFL}: Directed Grey-box Fuzzing guided by Data Dependency
Despite growing research interest, existing directed grey-box fuzzers do not scale well with
program complexity. In this paper, we identify two major scalability challenges for current …
program complexity. In this paper, we identify two major scalability challenges for current …
Stateformer: Fine-grained type recovery from binaries using generative state modeling
Binary type inference is a critical reverse engineering task supporting many security
applications, including vulnerability analysis, binary hardening, forensics, and …
applications, including vulnerability analysis, binary hardening, forensics, and …
{In-Kernel}{Control-Flow} integrity on commodity {OSes} using {ARM} pointer authentication
This paper presents an in-kernel, hardware-based control-flow integrity (CFI) protection,
called PAL, that utilizes ARM's Pointer Authentication (PA). It provides three important …
called PAL, that utilizes ARM's Pointer Authentication (PA). It provides three important …
{EL3XIR}: Fuzzing {COTS} Secure Monitors
ARM TrustZone forms the security backbone of mobile devices. TrustZone-based Trusted
Execution Environments (TEEs) facilitate security-sensitive tasks like user authentication …
Execution Environments (TEEs) facilitate security-sensitive tasks like user authentication …
GREBE: Unveiling exploitation potential for Linux kernel bugs
Nowadays, dynamic testing tools have significantly expedited the discovery of bugs in the
Linux kernel. When unveiling kernel bugs, they automatically generate reports, specifying …
Linux kernel. When unveiling kernel bugs, they automatically generate reports, specifying …
[PDF][PDF] Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel.
Due to the high cost of serializing instructions to mitigate Spectre-like attacks on
mispredicted conditional branches (Spectre-PHT), developers of critical software such as the …
mispredicted conditional branches (Spectre-PHT), developers of critical software such as the …