Cryptographic processors-a survey

R Anderson, M Bond, J Clulow… - Proceedings of the …, 2006 - ieeexplore.ieee.org
Tamper-resistant cryptographic processors are becoming the standard way to enforce data-
usage policies. Their origins lie with military cipher machines and PIN processing in banking …

Automatic exploit generation

T Avgerinos, SK Cha, A Rebert, EJ Schwartz… - Communications of the …, 2014 - dl.acm.org
Automatic exploit generation Page 1 contributed articles 74 CoMMuniCations of the aCM |
feBRuARy 2014 | voL. 57 | No. 2 aTTacKers commonLy eXpLoIT buggy programs to break into …

Q: Exploit hardening made easy

EJ Schwartz, T Avgerinos, D Brumley - 20th USENIX Security …, 2011 - usenix.org
Prior work has shown that return oriented programming (ROP) can be used to bypass W⊕
X, a software defense that stops shellcode, by reusing instructions from large libraries such …

How well does LLM generate security tests?

Y Zhang, W Song, Z Ji, N Meng - arxiv preprint arxiv:2310.00710, 2023 - arxiv.org
Developers often build software on top of third-party libraries (Libs) to improve programmer
productivity and software quality. The libraries may contain vulnerabilities exploitable by …

Moat: Verifying confidentiality of enclave programs

R Sinha, S Rajamani, S Seshia… - Proceedings of the 22nd …, 2015 - dl.acm.org
Security-critical applications constantly face threats from exploits in lower computing layers
such as the operating system, virtual machine monitors, or even attacks from malicious …

On automated prepared statement generation to remove SQL injection vulnerabilities

S Thomas, L Williams, T **e - Information and Software technology, 2009 - Elsevier
Since 2002, over 10% of total cyber vulnerabilities were SQL injection vulnerabilities
(SQLIVs). This paper presents an algorithm of prepared statement replacement for removing …

Vulnerability scrying method for software vulnerability discovery prediction without a vulnerability database

S Rahimi, M Zargham - IEEE Transactions on Reliability, 2013 - ieeexplore.ieee.org
Predicting software vulnerability discovery trends can help improve secure deployment of
software applications and facilitate backup provisioning, disaster recovery, diversity …

[КНИГА][B] Toward a safer and more secure cyberspace

HS Lin, SE Goodman - 2007 - books.google.com
Given the growing importance of cyberspace to nearly all aspects of national life, a secure
cyberspace is vitally important to the nation, but cyberspace is far from secure today. The …

Model-based security vulnerability testing

PAP Salas, P Krishnan, KJ Ross - 2007 Australian Software …, 2007 - ieeexplore.ieee.org
In this work we present a model-based framework for security vulnerabilities testing. Security
vulnerabilities are not only related to security functionalities at the application level but are …

Formal analysis of PIN block attacks

G Steel - Theoretical Computer Science, 2006 - Elsevier
Personal identification number (PIN) blocks are 64-bit strings that encode a PIN ready for
encryption and secure transmission in banking networks. These networks employ tamper …