DTaint: detecting the taint-style vulnerability in embedded device firmware

K Cheng, Q Li, L Wang, Q Chen… - 2018 48th Annual …, 2018 - ieeexplore.ieee.org
A rising number of embedded devices are reachable in the cyberspace, such as routers,
cameras, printers, etc. Those devices usually run firmware whose code is proprietary with …

Towards Understanding the Effectiveness of Large Language Models on Directed Test Input Generation

Z Jiang, M Wen, J Cao, X Shi, H ** - Proceedings of the 39th IEEE/ACM …, 2024 - dl.acm.org
Automatic testing has garnered significant attention and success over the past few decades.
Techniques such as unit testing and coverage-guided fuzzing have revealed numerous …

Systematic comparison of symbolic execution systems: intermediate representation and its generation

S Poeplau, A Francillon - Proceedings of the 35th Annual Computer …, 2019 - dl.acm.org
Symbolic execution has become a popular technique for software testing and vulnerability
detection. Most implementations transform the program under analysis to some intermediate …

EXAMINER: automatically locating inconsistent instructions between real devices and CPU emulators for ARM

M Jiang, T Xu, Y Zhou, Y Hu, M Zhong, L Wu… - Proceedings of the 27th …, 2022 - dl.acm.org
Emulators are widely used to build dynamic analysis frameworks due to its fine-grained
tracing capability, full system monitoring functionality, and scalability of running on different …

On secure and usable program obfuscation: A survey

H Xu, Y Zhou, Y Kang, MR Lyu - arxiv preprint arxiv:1710.01139, 2017 - arxiv.org
Program obfuscation is a widely employed approach for software intellectual property
protection. However, general obfuscation methods (eg, lexical obfuscation, control …

Benchmarking the capability of symbolic execution tools with logic bombs

H Xu, Z Zhao, Y Zhou, MR Lyu - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Symbolic execution has become an indispensable technique for software testing and
program analysis. However, since several symbolic execution tools are presently available …

Manufacturing resilient bi-opaque predicates against symbolic execution

H Xu, Y Zhou, Y Kang, F Tu… - 2018 48th Annual IEEE …, 2018 - ieeexplore.ieee.org
Control-flow obfuscation increases program complexity by semantic-preserving
transformation. Opaque predicates are essential gadgets to achieve such transformation …

End-to-end concolic testing for hardware/software co-validation

B Chen, K Cong, Z Yang, Q Wang… - … and Systems (ICESS …, 2019 - ieeexplore.ieee.org
Many recent approaches have been proposed to improve the quality of Systems-on-Chips
(SoC), mainly focusing on a specific part of the SoC, eg, device driver, hardware, firmware …

EXAMINER-PRO: Testing Arm Emulators across Different Privileges

M Jiang, X Zheng, R Chang, Y Zhou… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Emulators are commonly employed to construct dynamic analysis frameworks due to their
ability to perform fine-grained tracing, monitor full system functionality, and run on diverse …

Automated bug detection and replay for COTS linux kernel modules with concolic execution

B Chen, Z Yang, L Lei, K Cong… - 2020 IEEE 27th …, 2020 - ieeexplore.ieee.org
Linux kernel is pervasive in the cloud, on mobile platforms, and on supercomputers. To
support these diverse computing environments, the Linux kernel provides extensibility and …