Dynamic malware analysis in the modern era—A state of the art survey

O Or-Meir, N Nissim, Y Elovici, L Rokach - ACM Computing Surveys …, 2019‏ - dl.acm.org
Although malicious software (malware) has been around since the early days of computers,
the sophistication and innovation of malware has increased over the years. In particular, the …

A survey of symbolic execution techniques

R Baldoni, E Coppa, DC D'elia, C Demetrescu… - ACM Computing …, 2018‏ - dl.acm.org
Many security and software testing applications require checking whether certain properties
of a program hold for any possible usage scenario. For instance, a tool for identifying …

{AFL++}: Combining incremental steps of fuzzing research

A Fioraldi, D Maier, H Eißfeldt, M Heuse - 14th USENIX workshop on …, 2020‏ - usenix.org
In this paper, we present AFL++, a community-driven open-source tool that incorporates
state-of-the-art fuzzing research, to make the research comparable, reproducible …

The art, science, and engineering of fuzzing: A survey

VJM Manès, HS Han, C Han, SK Cha… - IEEE Transactions …, 2019‏ - ieeexplore.ieee.org
Among the many software testing techniques available today, fuzzing has remained highly
popular due to its conceptual simplicity, its low barrier to deployment, and its vast amount of …

[PDF][PDF] Smarter Contracts: Detecting Vulnerabilities in Smart Contracts with Deep Transfer Learning.

C Sendner, H Chen, H Fereidooni, L Petzi, J König… - NDSS, 2023‏ - ndss-symposium.org
Ethereum smart contracts are automated decentralized applications on the blockchain that
describe the terms of the agreement between buyers and sellers, reducing the need for …

Sok:(state of) the art of war: Offensive techniques in binary analysis

Y Shoshitaishvili, R Wang, C Salls… - … IEEE symposium on …, 2016‏ - ieeexplore.ieee.org
Finding and exploiting vulnerabilities in binary code is a challenging task. The lack of high-
level, semantically rich information about data structures and control constructs makes the …

Sereum: Protecting existing smart contracts against re-entrancy attacks

M Rodler, W Li, GO Karame, L Davi - arxiv preprint arxiv:1812.05934, 2018‏ - arxiv.org
Recently, a number of existing blockchain systems have witnessed major bugs and
vulnerabilities within smart contracts. Although the literature features a number of proposals …

Fuzzing: State of the art

H Liang, X Pei, X Jia, W Shen… - IEEE Transactions on …, 2018‏ - ieeexplore.ieee.org
As one of the most popular software testing techniques, fuzzing can find a variety of
weaknesses in a program, such as software bugs and vulnerabilities, by generating …

50 ways to leak your data: An exploration of apps' circumvention of the android permissions system

J Reardon, Á Feal, P Wijesekera, AEB On… - 28th USENIX security …, 2019‏ - usenix.org
Modern smartphone platforms implement permission-based models to protect access to
sensitive data and system resources. However, apps can circumvent the permission model …

Smart greybox fuzzing

VT Pham, M Böhme, AE Santosa… - IEEE Transactions …, 2019‏ - ieeexplore.ieee.org
Coverage-based greybox fuzzing (CGF) is one of the most successful approaches for
automated vulnerability detection. Given a seed file (as a sequence of bits), a CGF randomly …