Cryptoguard: High precision detection of cryptographic vulnerabilities in massive-sized java projects

S Rahaman, Y **ao, S Afrose, F Shaon, K Tian… - Proceedings of the …, 2019 - dl.acm.org
Cryptographic API misuses, such as exposed secrets, predictable random numbers, and
vulnerable certificate verification, seriously threaten software security. The vision of …

Using safety properties to generate vulnerability patches

Z Huang, D Lie, G Tan, T Jaeger - 2019 IEEE symposium on …, 2019 - ieeexplore.ieee.org
Security vulnerabilities are among the most critical software defects in existence. When
identified, programmers aim to produce patches that prevent the vulnerability as quickly as …

Understanding the reproducibility of crowd-reported security vulnerabilities

D Mu, A Cuevas, L Yang, H Hu, X **ng, B Mao… - 27th USENIX Security …, 2018 - usenix.org
Today's software systems are increasingly relying on the “power of the crowd” to identify new
security vulnerabilities. And yet, it is not well understood how reproducible the crowd …

{ARCUS}: symbolic root cause analysis of exploits in production systems

C Yagemann, M Pruett, SP Chung, K Bittick… - 30th USENIX Security …, 2021 - usenix.org
End-host runtime monitors (eg, CFI, system call IDS) flag processes in response to
symptoms of a possible attack. Unfortunately, the symptom (eg, invalid control transfer) may …

Automated bug hunting with data-driven symbolic root cause analysis

C Yagemann, SP Chung, B Saltaformaggio… - Proceedings of the 2021 …, 2021 - dl.acm.org
The increasing cost of successful cyberattacks has caused a mindset shift, whereby
defenders now employ proactive defenses, namely software bug hunting, alongside existing …

[PDF][PDF] State-of-the-art reinforcement learning algorithms

D Mehta - International Journal of Engineering Research and …, 2020 - academia.edu
This research paper brings together many different aspects of the current research on
several fields associated to Reinforcement Learning which has been growing rapidly …

[HTML][HTML] Enhancing Quadrotor Control Robustness with Multi-Proportional–Integral–Derivative Self-Attention-Guided Deep Reinforcement Learning

Y Ren, F Zhu, S Sui, Z Yi, K Chen - Drones, 2024 - mdpi.com
Deep reinforcement learning has demonstrated flexibility advantages in the control field of
quadrotor aircraft. However, when there are sudden disturbances in the environment …

A survey of anomaly and automation from a cybersecurity perspective

M Donevski, T Zia - 2018 IEEE Globecom Workshops (GC …, 2018 - ieeexplore.ieee.org
As the technological advances mature towards widespread adoption of Internet of Things
(IoT) and Cyber Physical Systems (CPS), there come new security challenges …

Program analysis of cryptographic implementations for security

S Rahaman, D Yao - 2017 IEEE Cybersecurity Development …, 2017 - ieeexplore.ieee.org
Cryptographic implementation errors in popular open source libraries (eg, OpenSSL,
GnuTLS, BotanTLS, etc.) and the misuses of cryptographic primitives (eg, as in Juniper …

From theory to code: identifying logical flaws in cryptographic implementations in C/C++

S Rahaman, H Cai, O Chowdhury… - IEEE transactions on …, 2021 - ieeexplore.ieee.org
Cryptographic protocols are often expected to be provably secure. However, this security
guarantee often falls short in practice due to various implementation flaws. We propose a …