Taintmini: Detecting flow of sensitive data in mini-programs with static taint analysis

C Wang, R Ko, Y Zhang, Y Yang… - 2023 IEEE/ACM 45th …, 2023 - ieeexplore.ieee.org
Mini-programs, which are programs running inside mobile super apps such as WeChat,
often have access to privacy-sensitive information, such as location data and phone …

Karonte: Detecting insecure multi-binary interactions in embedded firmware

N Redini, A Machiry, R Wang… - … IEEE Symposium on …, 2020 - ieeexplore.ieee.org
Low-power, single-purpose embedded devices (eg, routers and IoT devices) have become
ubiquitous. While they automate and simplify many aspects of users' lives, recent large-scale …

Sharing more and checking less: Leveraging common input keywords to detect bugs in embedded systems

L Chen, Y Wang, Q Cai, Y Zhan, H Hu… - 30th USENIX Security …, 2021 - usenix.org
IoT devices have brought invaluable convenience to our daily life. However, their
pervasiveness also amplifies the impact of security vulnerabilities. Many popular …

MCI: Modeling-based causality inference in audit logging for attack investigation

Y Kwon, F Wang, W Wang… - Network and …, 2018 - scholarship.libraries.rutgers.edu
In this paper, we develop a model based causality inference technique for audit logging that
does not require any application instrumentation or kernel modification. It leverages a recent …

Reassembleable disassembling

S Wang, P Wang, D Wu - 24th USENIX Security Symposium (USENIX …, 2015 - usenix.org
Reverse engineering has many important applications in computer security, one of which is
retrofitting software for safety and security hardening when source code is not available. By …

{PolyCruise}: A {Cross-Language} dynamic information flow analysis

W Li, J Ming, X Luo, H Cai - 31st USENIX Security Symposium (USENIX …, 2022 - usenix.org
Despite the fact that most real-world software systems today are written in multiple
programming languages, existing program analysis based security techniques are still …

Rain: Refinable attack investigation with on-demand inter-process information flow tracking

Y Ji, S Lee, E Downing, W Wang, M Fazzini… - Proceedings of the …, 2017 - dl.acm.org
As modern attacks become more stealthy and persistent, detecting or preventing them at
their early stages becomes virtually impossible. Instead, an attack investigation or …

DeepVulSeeker: A novel vulnerability identification framework via code graph structure and pre-training mechanism

J Wang, H **ao, S Zhong, Y **ao - Future Generation Computer Systems, 2023 - Elsevier
Software vulnerabilities can pose severe harms to a computing system. They can lead to
system crash, privacy leakage, or even physical damage. Correctly identifying vulnerabilities …

{BootStomp}: On the security of bootloaders in mobile devices

N Redini, A Machiry, D Das, Y Fratantonio… - 26th USENIX Security …, 2017 - usenix.org
Modern mobile bootloaders play an important role in both the function and the security of the
device. They help ensure the Chain of Trust (CoT), where each stage of the boot process …

[HTML][HTML] A survey and taxonomy of program analysis for IoT platforms

AA Hamza, IT Abdel-Halim, MA Sobh… - Ain Shams Engineering …, 2021 - Elsevier
Heterogeneity in the Internet of Things (IoT) environment is a critical issue for supporting
security and privacy. IoT environment has become an open invitation to hackers to control …