MEBS: Uncovering Memory Life-Cycle Bugs in Operating System Kernels
Allocation, dereferencing, and freeing of memory data in kernels are coherently linked.
There widely exist real cases where the correctness of memory is compromised. This …
There widely exist real cases where the correctness of memory is compromised. This …
Sensing Error Handling Bugs in SSL Library Usages
C Li, M Zhou, X Han, M Gu - … on Trust, Security and Privacy in …, 2021 - ieeexplore.ieee.org
SSL library plays an important role in ensuring secure connections against remote attacks,
and thus the correct usages of SSL library should be guaranteed to avoid security and …
and thus the correct usages of SSL library should be guaranteed to avoid security and …
Towards a methodology for the development of secure cryptographic software
Historically, software security has approached the development of cryptographic software
merely as a feature to be added. This stance did not have a positive influence on the design …
merely as a feature to be added. This stance did not have a positive influence on the design …
Automata-Guided Control-Flow-Sensitive Fuzz Driver Generation.
Automata-Guided Control-Flow-Sensitive Fuzz Driver Generation Page 1 Public Automata-Guided
Control-Flow-Sensitive Fuzz Driver Generation Cen Zhang, Yuekang Li, Hao Zhou, Xiaohan …
Control-Flow-Sensitive Fuzz Driver Generation Cen Zhang, Yuekang Li, Hao Zhou, Xiaohan …
Last-Mile TLS Interception: Analysis and Observation of the Non-Public HTTPS Ecosystem
X de Carné de Carnavalet - 2019 - spectrum.library.concordia.ca
Transport Layer Security (TLS) is one of the most widely deployed cryptographic protocols
on the Internet that provides confidentiality, integrity, and a certain degree of authenticity of …
on the Internet that provides confidentiality, integrity, and a certain degree of authenticity of …
TLS on Android–Evolution over the last decade
M Oltrogge - 2021 - publikationen.sulb.uni-saarland.de
Smart devices and mobile platforms are omnipresent. Android OS has evolved to become
the most dominating mobile operating system on the market with billions of devices and a …
the most dominating mobile operating system on the market with billions of devices and a …
[PDF][PDF] 密码应用安全技术研究及软件密码模块检测的讨论
郑昉昱, 林璟锵, 魏荣, 王琼霄 - 密码学报, 2020 - jcr.cacrnet.org.cn
基于密码学原理的安全解决方案是网络空间安全研究的重要内容, 能够为信息系统提供各种必要
安全保障. 然而, 许多现实事例表明, 在信息系统中完善地实施密码技术并非易事. 尤其是 …
安全保障. 然而, 许多现实事例表明, 在信息系统中完善地实施密码技术并非易事. 尤其是 …
Secure Coding Practice in Java: Automatic Detection, Repair, and Vulnerability Demonstration
Y Zhang - 2023 - vtechworks.lib.vt.edu
The Java platform and third-party open-source libraries provide various Application
Programming Interfaces (APIs) to facilitate secure coding. However, using these APIs …
Programming Interfaces (APIs) to facilitate secure coding. However, using these APIs …
[PDF][PDF] SSLDoc: Automatically Diagnosing Incorrect SSL API Usages in C Programs.
Secure Sockets Layer (SSL) and Transport Layer Security (TLS) protocols provide a reliable
communication channel between applications over the Internet. Implementations of these …
communication channel between applications over the Internet. Implementations of these …
API Misuse Detection in C Programs: Practice on SSL APIs
Libraries offer reusable functionality through Application Programming Interfaces (APIs) with
usage constraints such as call conditions or orders. Constraint violations, ie API misuses …
usage constraints such as call conditions or orders. Constraint violations, ie API misuses …