Deep learning based vulnerability detection: Are we there yet?
Automated detection of software vulnerabilities is a fundamental problem in software
security. Existing program analysis techniques either suffer from high false positives or false …
security. Existing program analysis techniques either suffer from high false positives or false …
[HTML][HTML] Just-in-time software vulnerability detection: Are we there yet?
Background: Software vulnerabilities are weaknesses in source code that might be exploited
to cause harm or loss. Previous work has proposed a number of automated machine …
to cause harm or loss. Previous work has proposed a number of automated machine …
Osiris: Hunting for integer bugs in ethereum smart contracts
The capability of executing so-called smart contracts in a decentralised manner is one of the
compelling features of modern blockchains. Smart contracts are fully fledged programs …
compelling features of modern blockchains. Smart contracts are fully fledged programs …
Detecting vulnerability on IoT device firmware: A survey
Internet of things (IoT) devices make up 30% of all network-connected endpoints,
introducing vulnerabilities and novel attacks that make many companies as primary targets …
introducing vulnerabilities and novel attacks that make many companies as primary targets …
Modeling and discovering vulnerabilities with code property graphs
The vast majority of security breaches encountered today are a direct result of insecure
code. Consequently, the protection of computer systems critically depends on the rigorous …
code. Consequently, the protection of computer systems critically depends on the rigorous …
Fuzzing: State of the art
H Liang, X Pei, X Jia, W Shen… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
As one of the most popular software testing techniques, fuzzing can find a variety of
weaknesses in a program, such as software bugs and vulnerabilities, by generating …
weaknesses in a program, such as software bugs and vulnerabilities, by generating …
Appintent: Analyzing sensitive data transmission in android for privacy leakage detection
Android phones often carry personal information, attracting malicious developers to embed
code in Android applications to steal sensitive data. With known techniques in the literature …
code in Android applications to steal sensitive data. With known techniques in the literature …
TaintScope: A checksum-aware directed fuzzing tool for automatic software vulnerability detection
Fuzz testing has proven successful in finding security vulnerabilities in large programs.
However, traditional fuzz testing tools have a well-known common drawback: they are …
However, traditional fuzz testing tools have a well-known common drawback: they are …
Verismart: A highly precise safety verifier for ethereum smart contracts
We present VERISMART, a highly precise verifier for ensuring arithmetic safety of Ethereum
smart contracts. Writing safe smart contracts without unintended behavior is critically …
smart contracts. Writing safe smart contracts without unintended behavior is critically …
Automatic inference of search patterns for taint-style vulnerabilities
Taint-style vulnerabilities are a persistent problem in software development, as the recently
discovered" Heart bleed" vulnerability strikingly illustrates. In this class of vulnerabilities …
discovered" Heart bleed" vulnerability strikingly illustrates. In this class of vulnerabilities …