Osiris: Hunting for integer bugs in ethereum smart contracts

CF Torres, J Schütte, R State - Proceedings of the 34th annual computer …, 2018 - dl.acm.org
The capability of executing so-called smart contracts in a decentralised manner is one of the
compelling features of modern blockchains. Smart contracts are fully fledged programs …

[PDF][PDF] Discovre: Efficient cross-architecture identification of bugs in binary code.

S Eschweiler, K Yakdan, E Gerhards-Padilla - Ndss, 2016 - ndss-symposium.org
The identification of security-critical vulnerabilities is a key for protecting computer systems.
Being able to perform this process at the binary level is very important given that many …

Automatic exploit generation

T Avgerinos, SK Cha, A Rebert, EJ Schwartz… - Communications of the …, 2014 - dl.acm.org
Automatic exploit generation Page 1 contributed articles 74 CoMMuniCations of the aCM |
feBRuARy 2014 | voL. 57 | No. 2 aTTacKers commonLy eXpLoIT buggy programs to break into …

Detection of threats to networks, based on geographic location

Y Karta, I Avraham - US Patent 9,503,463, 2016 - Google Patents
(57) ABSTRACT A method for a wireless network. The network includes at least a server and
a plurality of computer devices wirelessly connected to the server. At least one of the …

Verismart: A highly precise safety verifier for ethereum smart contracts

S So, M Lee, J Park, H Lee, H Oh - 2020 IEEE Symposium on …, 2020 - ieeexplore.ieee.org
We present VERISMART, a highly precise verifier for ensuring arithmetic safety of Ethereum
smart contracts. Writing safe smart contracts without unintended behavior is critically …

Imf: Inferred model-based fuzzer

HS Han, SK Cha - Proceedings of the 2017 ACM SIGSAC Conference on …, 2017 - dl.acm.org
Kernel vulnerabilities are critical in security because they naturally allow attackers to gain
unprivileged root access. Although there has been much research on finding kernel …

{DR}.{CHECKER}: A soundy analysis for linux kernel drivers

A Machiry, C Spensky, J Corina, N Stephens… - 26th USENIX Security …, 2017 - usenix.org
While kernel drivers have long been know to poses huge security risks, due to their
privileged access and lower code quality, bug-finding tools for drivers are still greatly lacking …

[PDF][PDF] Enforcing Kernel Security Invariants with Data Flow Integrity.

C Song, B Lee, K Lu, W Harris, T Kim, W Lee - NDSS, 2016 - researchgate.net
The operation system kernel is the foundation of the whole system and is often the de facto
trusted computing base for many higher level security mechanisms. Unfortunately, kernel …

[PDF][PDF] Kasper: Scanning for Generalized Transient Execution Gadgets in the Linux Kernel.

B Johannesmeyer, J Koschel, K Razavi, H Bos… - NDSS, 2022 - download.vusec.net
Due to the high cost of serializing instructions to mitigate Spectre-like attacks on
mispredicted conditional branches (Spectre-PHT), developers of critical software such as the …

Detecting {Missing-Check} bugs via semantic-and {Context-Aware} criticalness and constraints inferences

K Lu, A Pakki, Q Wu - … USENIX Security Symposium (USENIX Security 19 …, 2019 - usenix.org
Missing a security check is a class of semantic bugs in software programs where erroneous
execution states are not validated. Missing-check bugs are particularly common in OS …