Towards measuring supply chain attacks on package managers for interpreted languages
Package managers have become a vital part of the modern software development process.
They allow developers to reuse third-party code, share their own code, minimize their …
They allow developers to reuse third-party code, share their own code, minimize their …
A systematic review of fuzzing
Fuzzing is an important technique in software and security testing that involves continuously
generating a large number of test cases against target programs to discover unexpected …
generating a large number of test cases against target programs to discover unexpected …
Automating seccomp filter generation for linux applications
Software vulnerabilities undermine the security of applications. By blocking unused
functionality, the impact of potential exploits can be reduced. While seccomp provides a …
functionality, the impact of potential exploits can be reduced. While seccomp provides a …
{D-Helix}: A Generic Decompiler Testing Framework Using Symbolic Differentiation
Decompilers, one of the widely used security tools, transform low-level binary programs
back into their high-level source representations, such as C/C++. While state-of-the-art …
back into their high-level source representations, such as C/C++. While state-of-the-art …
[PDF][PDF] Automating Patching of Vulnerable Open-Source Software Versions in Application Binaries.
Mobile application developers rely heavily on opensource software (OSS) to offload
common functionalities such as the implementation of protocols and media format playback …
common functionalities such as the implementation of protocols and media format playback …
Fuzzing sgx enclaves via host program mutations
Intel Software Guard eXtension (SGX) is the cornerstone of Confidential Computing,
enabling runtime code and data integrity and confidentiality via enclaves. Unfortunately …
enabling runtime code and data integrity and confidentiality via enclaves. Unfortunately …
[HTML][HTML] An empirical study of problems and evaluation of IoT malware classification label sources
T Lei, J Xue, Y Wang, T Baker, Z Niu - Journal of King Saud University …, 2024 - Elsevier
With the proliferation of malware on IoT devices, research on IoT malicious code has also
become more mature. Most studies use learning models to detect or classify malware …
become more mature. Most studies use learning models to detect or classify malware …
IoT malware classification based on lightweight convolutional neural networks
B Yuan, J Wang, P Wu, X Qing - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) is hard to deploy adequate security defenses due to the diversity of
architectures as well as the limited computing and storage capabilities, which makes it more …
architectures as well as the limited computing and storage capabilities, which makes it more …
{AIFORE}: Smart Fuzzing Based on Automatic Input Format Reverse Engineering
Knowledge of a program's input format is essential for effective input generation in fuzzing.
Automated input format reverse engineering represents an attractive but challenging …
Automated input format reverse engineering represents an attractive but challenging …
Rewrite to reinforce: Rewriting the binary to apply countermeasures against fault injection
Fault injection attacks can cause errors in software for malicious purposes. Oftentimes,
vulnerable points of a program are detected after its development. It is therefore critical for …
vulnerable points of a program are detected after its development. It is therefore critical for …