Edge computing security: State of the art and challenges

Y **ao, Y Jia, C Liu, X Cheng, J Yu… - Proceedings of the …, 2019 - ieeexplore.ieee.org
The rapid developments of the Internet of Things (IoT) and smart mobile devices in recent
years have been dramatically incentivizing the advancement of edge computing. On the one …

A survey of symbolic execution techniques

R Baldoni, E Coppa, DC D'elia, C Demetrescu… - ACM Computing …, 2018 - dl.acm.org
Many security and software testing applications require checking whether certain properties
of a program hold for any possible usage scenario. For instance, a tool for identifying …

Neural network-based graph embedding for cross-platform binary code similarity detection

X Xu, C Liu, Q Feng, H Yin, L Song… - Proceedings of the 2017 …, 2017 - dl.acm.org
The problem of cross-platform binary code similarity detection aims at detecting whether two
binary functions coming from different platforms are similar or not. It has many security …

Botnets and internet of things security

E Bertino, N Islam - Computer, 2017 - ieeexplore.ieee.org
Botnets and Internet of Things Security Page 1 76 COMPUTER PUBLISHED BY THE IEEE
COMPUTER SOCIETY 0018-9162/17/$33.00 © 2017 IEEE SECTION TITLE CYBERTRUST The …

Sok:(state of) the art of war: Offensive techniques in binary analysis

Y Shoshitaishvili, R Wang, C Salls… - … IEEE symposium on …, 2016 - ieeexplore.ieee.org
Finding and exploiting vulnerabilities in binary code is a challenging task. The lack of high-
level, semantically rich information about data structures and control constructs makes the …

[PDF][PDF] Driller: Augmenting Fuzzing Through Selective Symbolic Execution

N Stephens - 2016 - jacopo.cc
Memory corruption vulnerabilities are an everpresent risk in software, which attackers can
exploit to obtain unauthorized access to confidential information. As products with access to …

Data-driven cybersecurity incident prediction: A survey

N Sun, J Zhang, P Rimba, S Gao… - … surveys & tutorials, 2018 - ieeexplore.ieee.org
Driven by the increasing scale and high profile cybersecurity incidents related public data,
recent years we have witnessed a paradigm shift in understanding and defending against …

{FIRM-AFL}:{High-Throughput} greybox fuzzing of {IoT} firmware via augmented process emulation

Y Zheng, A Davanian, H Yin, C Song, H Zhu… - 28th USENIX Security …, 2019 - usenix.org
Cyber attacks against IoT devices are a severe threat. These attacks exploit software
vulnerabilities in IoT firmware. Fuzzing is an effective software testing technique for finding …

[PDF][PDF] IoTFuzzer: Discovering Memory Corruptions in IoT Through App-based Fuzzing.

J Chen, W Diao, Q Zhao, C Zuo, Z Lin, XF Wang… - NDSS, 2018 - staff.ie.cuhk.edu.hk
With more IoT devices entering the consumer market, it becomes imperative to detect their
security vulnerabilities before an attacker does. Existing binary analysis based approaches …

Symlm: Predicting function names in stripped binaries via context-sensitive execution-aware code embeddings

X **, K Pei, JY Won, Z Lin - Proceedings of the 2022 ACM SIGSAC …, 2022 - dl.acm.org
Predicting function names in stripped binaries is an extremely useful but challenging task, as
it requires summarizing the execution behavior and semantics of the function in human …