{MVP}: Detecting vulnerabilities using {Patch-Enhanced} vulnerability signatures

Y **ao, B Chen, C Yu, Z Xu, Z Yuan, F Li, B Liu… - 29th USENIX Security …, 2020 - usenix.org
Recurring vulnerabilities widely exist and remain undetected in real-world systems, which
are often resulted from reused code base or shared code logic. However, the potentially …

Patchdb: A large-scale security patch dataset

X Wang, S Wang, P Feng, K Sun… - 2021 51st Annual IEEE …, 2021 - ieeexplore.ieee.org
Security patches, embedding both vulnerable code and the corresponding fixes, are of great
significance to vulnerability detection and software maintenance. However, the existing …

Graphspd: Graph-based security patch detection with enriched code semantics

S Wang, X Wang, K Sun, S Jajodia… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
With the increasing popularity of open-source software, embedded vulnerabilities have been
widely propagating to downstream software. Due to different maintenance policies, software …

{RapidPatch}: firmware hotpatching for {Real-Time} embedded devices

Y He, Z Zou, K Sun, Z Liu, K Xu, Q Wang… - 31st USENIX Security …, 2022 - usenix.org
Nowadays real-time embedded devices are becoming one main target of cyber attacks. A
huge number of embedded devices equipped with outdated firmware are subject to various …

{Defects-in-Depth}: Analyzing the Integration of Effective Defenses against {One-Day} Exploits in Android Kernels

L Maar, F Draschbacher, L Lamster… - 33rd USENIX Security …, 2024 - usenix.org
With the mobile phone market exceeding one billion units sold in 2023, ensuring the security
of these devices is critical. However, recent research has revealed worrying delays in the …

Exploring the limits of chatgpt in software security applications

F Wu, Q Zhang, AP Bajaj, T Bao, N Zhang… - arxiv preprint arxiv …, 2023 - arxiv.org
Large language models (LLMs) have undergone rapid evolution and achieved remarkable
results in recent times. OpenAI's ChatGPT, backed by GPT-3.5 or GPT-4, has gained instant …

Towards practical binary code similarity detection: Vulnerability verification via patch semantic analysis

S Yang, Z Xu, Y **ao, Z Lang, W Tang, Y Liu… - ACM Transactions on …, 2023 - dl.acm.org
Vulnerability is a major threat to software security. It has been proven that binary code
similarity detection approaches are efficient to search for recurring vulnerabilities introduced …

{ICSPatch}: Automated Vulnerability Localization and {Non-Intrusive} Hotpatching in Industrial Control Systems using Data Dependence Graphs

PHN Rajput, C Doumanidis, M Maniatakos - 32nd USENIX Security …, 2023 - usenix.org
The paradigm shift of enabling extensive intercommunication between the Operational
Technology (OT) and Information Technology (IT) devices allows vulnerabilities typical to the …

Just-in-Time Security Patch Detection--LLM At the Rescue for Data Augmentation

X Tang, Z Chen, K Kim, H Tian, S Ezzini… - arxiv preprint arxiv …, 2023 - arxiv.org
In the face of growing vulnerabilities found in open-source software, the need to identify
{discreet} security patches has become paramount. The lack of consistency in how software …

Tracking patches for open source software vulnerabilities

C Xu, B Chen, C Lu, K Huang, X Peng… - Proceedings of the 30th …, 2022 - dl.acm.org
Open source software (OSS) vulnerabilities threaten the security of software systems that
use OSS. Vulnerability databases provide valuable information (eg, vulnerable version and …