Enhancing static analysis for practical bug detection: An llm-integrated approach

H Li, Y Hao, Y Zhai, Z Qian - Proceedings of the ACM on Programming …, 2024 - dl.acm.org
While static analysis is instrumental in uncovering software bugs, its precision in analyzing
large and intricate codebases remains challenging. The emerging prowess of Large …

Sok: Runtime integrity

M Ammar, A Caulfield, IDO Nunes - arxiv preprint arxiv:2408.10200, 2024 - arxiv.org
This paper provides a systematic exploration of Control Flow Integrity (CFI) and Control Flow
Attestation (CFA) mechanisms, examining their differences and relationships. It addresses …

The Hitchhiker's Guide to Program Analysis: A Journey with Large Language Models

H Li, Y Hao, Y Zhai, Z Qian - arxiv preprint arxiv:2308.00245, 2023 - arxiv.org
Static analysis is a widely used technique in software engineering for identifying and
mitigating bugs. However, a significant hurdle lies in achieving a delicate balance between …

Sok: Integrity, attestation, and auditing of program execution

M Ammar, A Caulfield, IDO Nunes - 2025 IEEE Symposium on …, 2024 - computer.org
This paper provides a systematic exploration of Control Flow Integrity (CFI) and Control Flow
Attestation (CFA) mechanisms, examining their differences and relationships. It addresses …

{DAFL}: Directed Grey-box Fuzzing guided by Data Dependency

TE Kim, J Choi, K Heo, SK Cha - 32nd USENIX Security Symposium …, 2023 - usenix.org
Despite growing research interest, existing directed grey-box fuzzers do not scale well with
program complexity. In this paper, we identify two major scalability challenges for current …

Stateformer: Fine-grained type recovery from binaries using generative state modeling

K Pei, J Guan, M Broughton, Z Chen, S Yao… - Proceedings of the 29th …, 2021 - dl.acm.org
Binary type inference is a critical reverse engineering task supporting many security
applications, including vulnerability analysis, binary hardening, forensics, and …

{In-Kernel}{Control-Flow} integrity on commodity {OSes} using {ARM} pointer authentication

S Yoo, J Park, S Kim, Y Kim, T Kim - 31st USENIX Security Symposium …, 2022 - usenix.org
This paper presents an in-kernel, hardware-based control-flow integrity (CFI) protection,
called PAL, that utilizes ARM's Pointer Authentication (PA). It provides three important …

{EL3XIR}: Fuzzing {COTS} Secure Monitors

C Lindenmeier, M Payer, M Busch - 33rd USENIX Security Symposium …, 2024 - usenix.org
ARM TrustZone forms the security backbone of mobile devices. TrustZone-based Trusted
Execution Environments (TEEs) facilitate security-sensitive tasks like user authentication …

GREBE: Unveiling exploitation potential for Linux kernel bugs

Z Lin, Y Chen, Y Wu, D Mu, C Yu… - 2022 IEEE Symposium …, 2022 - ieeexplore.ieee.org
Nowadays, dynamic testing tools have significantly expedited the discovery of bugs in the
Linux kernel. When unveiling kernel bugs, they automatically generate reports, specifying …

[PDF][PDF] Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel.

B Johannesmeyer, J Koschel, K Razavi, H Bos… - NDSS, 2022 - download.vusec.net
Due to the high cost of serializing instructions to mitigate Spectre-like attacks on
mispredicted conditional branches (Spectre-PHT), developers of critical software such as the …