Fuzzing: State of the art

H Liang, X Pei, X Jia, W Shen… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
As one of the most popular software testing techniques, fuzzing can find a variety of
weaknesses in a program, such as software bugs and vulnerabilities, by generating …

Breaking through binaries: Compiler-quality instrumentation for better binary-only fuzzing

S Nagy, A Nguyen-Tuong, JD Hiser… - 30th USENIX Security …, 2021 - usenix.org
Coverage-guided fuzzing is one of the most effective software security testing techniques.
Fuzzing takes on one of two forms: compiler-based or binary-only, depending on the …

Taking control of sdn-based cloud systems via the data plane

K Thimmaraju, B Shastry, T Fiebig, F Hetzelt… - Proceedings of the …, 2018 - dl.acm.org
Virtual switches are a crucial component of SDN-based cloud systems, enabling the
interconnection of virtual machines in a flexible and" software-defined" manner. This paper …

Statically discovering high-order taint style vulnerabilities in os kernels

H Zhang, W Chen, Y Hao, G Li, Y Zhai, X Zou… - Proceedings of the 2021 …, 2021 - dl.acm.org
Static analysis is known to yield numerous false alarms when used in bug finding, especially
for complex vulnerabilities in large code bases like the Linux kernel. One important class of …

Hybrid pruning: Towards precise pointer and taint analysis

D Das, P Bose, A Machiry, S Mariani… - … on Detection of …, 2022 - Springer
Pointer and taint analyses are the building blocks for several other static analysis
techniques. Unfortunately, these techniques frequently sacrifice precision in favor of …

Secure and reliable data transmission in SDN-based backend networks of industrial IoT

T Li, C Hofmann, E Franz - 2020 IEEE 45th Conference on …, 2020 - ieeexplore.ieee.org
Software Defined Networking (SDN) is established as a widely used concept in networks
and has been introduced into the network architecture of Industrial Internet of Things (IIoT) …

Strategy for security certification of high assurance industrial automation and control systems

T Schulz, C Griest, F Golatowski… - 2018 IEEE 13th …, 2018 - ieeexplore.ieee.org
High assurance Cyber-Physical Systems (CPS) are the supporting pillars of the critical
infrastructure. They support the power grid, the water supply, transportation systems and …

The vamp attack: Taking control of cloud systems via the unified packet parser

K Thimmaraju, B Shastry, T Fiebig, F Hetzelt… - Proceedings of the …, 2017 - dl.acm.org
Virtual switches are a crucial component of cloud operating systems that interconnect virtual
machines in a flexible manner. They implement complex network protocol parsing in the …

A Security Sensitive Function Mining Approach Based on Precondition Pattern Analysis.

Z Yin, Y Song, H Chen, Y Cao - Computers, Materials & …, 2020 - search.ebscohost.com
Security-sensitive functions are the basis for building a taint-style vulnerability model.
Current approaches for extracting security-sensitive functions either don't analyze data flow …

Practical Feedback and Instrumentation Enhancements for Performant Security Testing of Closed-source Executables

S Nagy - 2022 - vtechworks.lib.vt.edu
Abstract The Department of Homeland Security reports that over 90% of cyberattacks stem
from security vulnerabilities in software, costing the US $109 billion dollars in damages in …