Interpreters for GNN-based vulnerability detection: Are we there yet?

Y Hu, S Wang, W Li, J Peng, Y Wu, D Zou… - Proceedings of the 32nd …, 2023 - dl.acm.org
Traditional vulnerability detection methods have limitations due to their need for extensive
manual labor. Using automated means for vulnerability detection has attracted research …

Selectfuzz: Efficient directed fuzzing with selective path exploration

C Luo, W Meng, P Li - 2023 IEEE Symposium on Security and …, 2023 - ieeexplore.ieee.org
Directed grey-box fuzzers specialize in testing specific target code. They have been applied
to many security applications such as reproducing known crashes and detecting …

GraphSPD: Graph-based security patch detection with enriched code semantics

S Wang, X Wang, K Sun, S Jajodia… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
With the increasing popularity of open-source software, embedded vulnerabilities have been
widely propagating to downstream software. Due to different maintenance policies, software …

Patchdb: A large-scale security patch dataset

X Wang, S Wang, P Feng, K Sun… - 2021 51st Annual IEEE …, 2021 - ieeexplore.ieee.org
Security patches, embedding both vulnerable code and the corresponding fixes, are of great
significance to vulnerability detection and software maintenance. However, the existing …

{RapidPatch}: firmware hotpatching for {Real-Time} embedded devices

Y He, Z Zou, K Sun, Z Liu, K Xu, Q Wang… - 31st USENIX Security …, 2022 - usenix.org
Nowadays real-time embedded devices are becoming one main target of cyber attacks. A
huge number of embedded devices equipped with outdated firmware are subject to various …

Critical code guided directed greybox fuzzing for commits

Y Xiang, X Zhang, P Liu, S Ji, H Liang, J Xu… - 33rd USENIX Security …, 2024 - usenix.org
Newly submitted commits are prone to introducing vulnerabilities into programs. As a
promising countermeasure, directed greybox fuzzers can be employed to test commit …

Playing for {K (H) eaps}: Understanding and improving linux kernel exploit reliability

K Zeng, Y Chen, H Cho, X Xing, A Doupé… - 31st USENIX Security …, 2022 - usenix.org
The dynamic of the Linux kernel heap layout significantly impacts the reliability of kernel
heap exploits, making exploitability assessment challenging. Though techniques have been …

An investigation of the android kernel patch ecosystem

Z Zhang, H Zhang, Z Qian, B Lau - 30th USENIX Security Symposium …, 2021 - usenix.org
open-source projects are often reused in commercial software. Android, a popular mobile
operating system, is a great example that has fostered an ecosystem of open-source …

{Syzscope}: Revealing {high-risk} security impacts of {fuzzer-exposed} bugs in linux kernel

X Zou, G Li, W Chen, H Zhang, Z Qian - 31st USENIX Security …, 2022 - usenix.org
Fuzzing has become one of the most effective bug finding approach for software. In recent
years, 24* 7 continuous fuzzing platforms have emerged to test critical pieces of software …

[PDF][PDF] On the feasibility of stealthily introducing vulnerabilities in open-source software via hypocrite commits

Q Wu, K Lu - Proc. Oakland, 2021 - coding-guidelines.com
Open source software (OSS) has thrived since the forming of Open Source Initiative in 1998.
A prominent example is the Linux kernel, which has been used by numerous major software …