Towards measuring supply chain attacks on package managers for interpreted languages

R Duan, O Alrawi, RP Kasturi, R Elder… - arxiv preprint arxiv …, 2020 - arxiv.org
Package managers have become a vital part of the modern software development process.
They allow developers to reuse third-party code, share their own code, minimize their …

A systematic review of fuzzing

X Zhao, H Qu, J Xu, X Li, W Lv, GG Wang - Soft Computing, 2024 - Springer
Fuzzing is an important technique in software and security testing that involves continuously
generating a large number of test cases against target programs to discover unexpected …

Automating seccomp filter generation for linux applications

C Canella, M Werner, D Gruss, M Schwarz - Proceedings of the 2021 on …, 2021 - dl.acm.org
Software vulnerabilities undermine the security of applications. By blocking unused
functionality, the impact of potential exploits can be reduced. While seccomp provides a …

{D-Helix}: A Generic Decompiler Testing Framework Using Symbolic Differentiation

M Zou, A Khan, R Wu, H Gao, A Bianchi… - 33rd USENIX Security …, 2024 - usenix.org
Decompilers, one of the widely used security tools, transform low-level binary programs
back into their high-level source representations, such as C/C++. While state-of-the-art …

[PDF][PDF] Automating Patching of Vulnerable Open-Source Software Versions in Application Binaries.

R Duan, A Bijlani, Y Ji, O Alrawi, Y **ong, M Ike… - NDSS, 2019 - alrawi.github.io
Mobile application developers rely heavily on opensource software (OSS) to offload
common functionalities such as the implementation of protocols and media format playback …

Fuzzing sgx enclaves via host program mutations

A Khan, M Zou, K Kim, D Xu, A Bianchi… - 2023 IEEE 8th …, 2023 - ieeexplore.ieee.org
Intel Software Guard eXtension (SGX) is the cornerstone of Confidential Computing,
enabling runtime code and data integrity and confidentiality via enclaves. Unfortunately …

[HTML][HTML] An empirical study of problems and evaluation of IoT malware classification label sources

T Lei, J Xue, Y Wang, T Baker, Z Niu - Journal of King Saud University …, 2024 - Elsevier
With the proliferation of malware on IoT devices, research on IoT malicious code has also
become more mature. Most studies use learning models to detect or classify malware …

IoT malware classification based on lightweight convolutional neural networks

B Yuan, J Wang, P Wu, X Qing - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) is hard to deploy adequate security defenses due to the diversity of
architectures as well as the limited computing and storage capabilities, which makes it more …

{AIFORE}: Smart Fuzzing Based on Automatic Input Format Reverse Engineering

J Shi, Z Wang, Z Feng, Y Lan, S Qin, W You… - 32nd USENIX Security …, 2023 - usenix.org
Knowledge of a program's input format is essential for effective input generation in fuzzing.
Automated input format reverse engineering represents an attractive but challenging …

Rewrite to reinforce: Rewriting the binary to apply countermeasures against fault injection

P Kiaei, CB Breunesse, M Ahmadi… - 2021 58th ACM/IEEE …, 2021 - ieeexplore.ieee.org
Fault injection attacks can cause errors in software for malicious purposes. Oftentimes,
vulnerable points of a program are detected after its development. It is therefore critical for …