Osiris: Hunting for integer bugs in ethereum smart contracts
The capability of executing so-called smart contracts in a decentralised manner is one of the
compelling features of modern blockchains. Smart contracts are fully fledged programs …
compelling features of modern blockchains. Smart contracts are fully fledged programs …
[PDF][PDF] Discovre: Efficient cross-architecture identification of bugs in binary code.
The identification of security-critical vulnerabilities is a key for protecting computer systems.
Being able to perform this process at the binary level is very important given that many …
Being able to perform this process at the binary level is very important given that many …
Automatic exploit generation
Automatic exploit generation Page 1 contributed articles 74 CoMMuniCations of the aCM |
feBRuARy 2014 | voL. 57 | No. 2 aTTacKers commonLy eXpLoIT buggy programs to break into …
feBRuARy 2014 | voL. 57 | No. 2 aTTacKers commonLy eXpLoIT buggy programs to break into …
Detection of threats to networks, based on geographic location
Y Karta, I Avraham - US Patent 9,503,463, 2016 - Google Patents
(57) ABSTRACT A method for a wireless network. The network includes at least a server and
a plurality of computer devices wirelessly connected to the server. At least one of the …
a plurality of computer devices wirelessly connected to the server. At least one of the …
Verismart: A highly precise safety verifier for ethereum smart contracts
We present VERISMART, a highly precise verifier for ensuring arithmetic safety of Ethereum
smart contracts. Writing safe smart contracts without unintended behavior is critically …
smart contracts. Writing safe smart contracts without unintended behavior is critically …
Imf: Inferred model-based fuzzer
Kernel vulnerabilities are critical in security because they naturally allow attackers to gain
unprivileged root access. Although there has been much research on finding kernel …
unprivileged root access. Although there has been much research on finding kernel …
{DR}.{CHECKER}: A soundy analysis for linux kernel drivers
While kernel drivers have long been know to poses huge security risks, due to their
privileged access and lower code quality, bug-finding tools for drivers are still greatly lacking …
privileged access and lower code quality, bug-finding tools for drivers are still greatly lacking …
[PDF][PDF] Enforcing Kernel Security Invariants with Data Flow Integrity.
The operation system kernel is the foundation of the whole system and is often the de facto
trusted computing base for many higher level security mechanisms. Unfortunately, kernel …
trusted computing base for many higher level security mechanisms. Unfortunately, kernel …
[PDF][PDF] Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel.
Due to the high cost of serializing instructions to mitigate Spectre-like attacks on
mispredicted conditional branches (Spectre-PHT), developers of critical software such as the …
mispredicted conditional branches (Spectre-PHT), developers of critical software such as the …
Detecting {Missing-Check} bugs via semantic-and {Context-Aware} criticalness and constraints inferences
Missing a security check is a class of semantic bugs in software programs where erroneous
execution states are not validated. Missing-check bugs are particularly common in OS …
execution states are not validated. Missing-check bugs are particularly common in OS …