Towards measuring supply chain attacks on package managers for interpreted languages

R Duan, O Alrawi, RP Kasturi, R Elder… - arXiv preprint arXiv …, 2020 - arxiv.org
Package managers have become a vital part of the modern software development process.
They allow developers to reuse third-party code, share their own code, minimize their …

A systematic review of fuzzing

X Zhao, H Qu, J Xu, X Li, W Lv, GG Wang - Soft Computing, 2024 - Springer
Fuzzing is an important technique in software and security testing that involves continuously
generating a large number of test cases against target programs to discover unexpected …

Automating seccomp filter generation for linux applications

C Canella, M Werner, D Gruss, M Schwarz - Proceedings of the 2021 on …, 2021 - dl.acm.org
Software vulnerabilities undermine the security of applications. By blocking unused
functionality, the impact of potential exploits can be reduced. While seccomp provides a …

Fuzzing sgx enclaves via host program mutations

A Khan, M Zou, K Kim, D Xu, A Bianchi… - 2023 IEEE 8th …, 2023 - ieeexplore.ieee.org
Intel Software Guard eXtension (SGX) is the cornerstone of Confidential Computing,
enabling runtime code and data integrity and confidentiality via enclaves. Unfortunately …

[PDF][PDF] Automating Patching of Vulnerable Open-Source Software Versions in Application Binaries.

R Duan, A Bijlani, Y Ji, O Alrawi, Y Xiong, M Ike… - NDSS, 2019 - alrawi.github.io
Mobile application developers rely heavily on opensource software (OSS) to offload
common functionalities such as the implementation of protocols and media format playback …

IoT malware classification based on lightweight convolutional neural networks

B Yuan, J Wang, P Wu, X Qing - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
Internet of Things (IoT) is hard to deploy adequate security defenses due to the diversity of
architectures as well as the limited computing and storage capabilities, which makes it more …

[HTML][HTML] An empirical study of problems and evaluation of IoT malware classification label sources

T Lei, J Xue, Y Wang, T Baker, Z Niu - Journal of King Saud University …, 2024 - Elsevier
With the proliferation of malware on IoT devices, research on IoT malicious code has also
become more mature. Most studies use learning models to detect or classify malware …

{AIFORE}: Smart Fuzzing Based on Automatic Input Format Reverse Engineering

J Shi, Z Wang, Z Feng, Y Lan, S Qin, W You… - 32nd USENIX Security …, 2023 - usenix.org
Knowledge of a program's input format is essential for effective input generation in fuzzing.
Automated input format reverse engineering represents an attractive but challenging …

Rewrite to reinforce: Rewriting the binary to apply countermeasures against fault injection

P Kiaei, CB Breunesse, M Ahmadi… - 2021 58th ACM/IEEE …, 2021 - ieeexplore.ieee.org
Fault injection attacks can cause errors in software for malicious purposes. Oftentimes,
vulnerable points of a program are detected after its development. It is therefore critical for …

Physical devices-agnostic hybrid fuzzing of IoT firmware

L Situ, C Zhang, L Guan, Z Zuo, L Wang… - IEEE Internet of …, 2023 - ieeexplore.ieee.org
With the rapid expansion of the Internet of Things, a vast number of microcontroller-based
(MCU) IoT devices are now susceptible to attacks through the Internet. Vulnerabilities within …