MEBS: Uncovering Memory Life-Cycle Bugs in Operating System Kernels

G Zhang, PF Wang, T Yue, X Zhou, K Lu - Journal of Computer Science …, 2021 - Springer
Allocation, dereferencing, and freeing of memory data in kernels are coherently linked.
There widely exist real cases where the correctness of memory is compromised. This …

Sensing Error Handling Bugs in SSL Library Usages

C Li, M Zhou, X Han, M Gu - … on Trust, Security and Privacy in …, 2021 - ieeexplore.ieee.org
SSL library plays an important role in ensuring secure connections against remote attacks,
and thus the correct usages of SSL library should be guaranteed to avoid security and …

Towards a methodology for the development of secure cryptographic software

AM Braga, R Dahab - 2016 International Conference on …, 2016 - ieeexplore.ieee.org
Historically, software security has approached the development of cryptographic software
merely as a feature to be added. This stance did not have a positive influence on the design …

Automata-Guided Control-Flow-Sensitive Fuzz Driver Generation.

C Zhang, Y Li, H Zhou, X Zhang, Y Zheng… - USENIX Security …, 2023 - usenix.org
Automata-Guided Control-Flow-Sensitive Fuzz Driver Generation Page 1 Public Automata-Guided
Control-Flow-Sensitive Fuzz Driver Generation Cen Zhang, Yuekang Li, Hao Zhou, Xiaohan …

Last-Mile TLS Interception: Analysis and Observation of the Non-Public HTTPS Ecosystem

X de Carné de Carnavalet - 2019 - spectrum.library.concordia.ca
Transport Layer Security (TLS) is one of the most widely deployed cryptographic protocols
on the Internet that provides confidentiality, integrity, and a certain degree of authenticity of …

TLS on Android–Evolution over the last decade

M Oltrogge - 2021 - publikationen.sulb.uni-saarland.de
Smart devices and mobile platforms are omnipresent. Android OS has evolved to become
the most dominating mobile operating system on the market with billions of devices and a …

[PDF][PDF] 密码应用安全技术研究及软件密码模块检测的讨论

郑昉昱, 林璟锵, 魏荣, 王琼霄 - 密码学报, 2020 - jcr.cacrnet.org.cn
基于密码学原理的安全解决方案是网络空间安全研究的重要内容, 能够为信息系统提供各种必要
安全保障. 然而, 许多现实事例表明, 在信息系统中完善地实施密码技术并非易事. 尤其是 …

Secure Coding Practice in Java: Automatic Detection, Repair, and Vulnerability Demonstration

Y Zhang - 2023 - vtechworks.lib.vt.edu
The Java platform and third-party open-source libraries provide various Application
Programming Interfaces (APIs) to facilitate secure coding. However, using these APIs …

[PDF][PDF] SSLDoc: Automatically Diagnosing Incorrect SSL API Usages in C Programs.

Z Gu, J Wu, C Li, M Zhou, M Gu - SEKE, 2019 - ksiresearch.org
Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols provide a reliable
communication channel between applications over the Internet. Implementations of these …

API Misuse Detection in C Programs: Practice on SSL APIs

C Li, Z Gu, M Zhou, J Wu, J Zhang… - International Journal of …, 2019 - World Scientific
Libraries offer reusable functionality through Application Programming Interfaces (APIs) with
usage constraints such as call conditions or orders. Constraint violations, ie API misuses …