{MVP}: Detecting vulnerabilities using {Patch-Enhanced} vulnerability signatures

Y Xiao, B Chen, C Yu, Z Xu, Z Yuan, F Li, B Liu… - 29th USENIX Security …, 2020 - usenix.org
Recurring vulnerabilities widely exist and remain undetected in real-world systems, which
are often resulted from reused code base or shared code logic. However, the potentially …

GraphSPD: Graph-based security patch detection with enriched code semantics

S Wang, X Wang, K Sun, S Jajodia… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
With the increasing popularity of open-source software, embedded vulnerabilities have been
widely propagating to downstream software. Due to different maintenance policies, software …

Patchdb: A large-scale security patch dataset

X Wang, S Wang, P Feng, K Sun… - 2021 51st Annual IEEE …, 2021 - ieeexplore.ieee.org
Security patches, embedding both vulnerable code and the corresponding fixes, are of great
significance to vulnerability detection and software maintenance. However, the existing …

{RapidPatch}: firmware hotpatching for {Real-Time} embedded devices

Y He, Z Zou, K Sun, Z Liu, K Xu, Q Wang… - 31st USENIX Security …, 2022 - usenix.org
Nowadays real-time embedded devices are becoming one main target of cyber attacks. A
huge number of embedded devices equipped with outdated firmware are subject to various …

{PET}: Prevent discovered errors from being triggered in the linux kernel

Z Wang, Y Chen, Q Zeng - 32nd USENIX Security Symposium (USENIX …, 2023 - usenix.org
The Linux kernel is the backbone of modern society. When a kernel error is discovered, a
quick remediation is needed. Whereas sanitizers greatly facilitate root cause diagnosis …

Just-in-Time Security Patch Detection--LLM At the Rescue for Data Augmentation

X Tang, Z Chen, K Kim, H Tian, S Ezzini… - arXiv preprint arXiv …, 2023 - arxiv.org
In the face of growing vulnerabilities found in open-source software, the need to identify
{discreet} security patches has become paramount. The lack of consistency in how software …

BinGo: Identifying Security Patches in Binary Code with Graph Representation Learning

X He, S Wang, P Feng, X Wang, S Sun, Q Li… - Proceedings of the 19th …, 2024 - dl.acm.org
A timely software update is vital to combat the increasing security vulnerabilities. However,
some software vendors may secretly patch their vulnerabilities without creating CVE entries …

{ICSPatch}: Automated Vulnerability Localization and {Non-Intrusive} Hotpatching in Industrial Control Systems using Data Dependence Graphs

PHN Rajput, C Doumanidis, M Maniatakos - 32nd USENIX Security …, 2023 - usenix.org
The paradigm shift of enabling extensive intercommunication between the Operational
Technology (OT) and Information Technology (IT) devices allows vulnerabilities typical to the …

Runtime software patching: Taxonomy, survey and future directions

C Islam, V Prokhorenko, MA Babar - Journal of Systems and Software, 2023 - Elsevier
Runtime software patching aims to minimize or eliminate service downtime, user
interruptions and potential data losses while deploying a patch. Due to modern software …

Backporting security patches of web applications: A prototype design and implementation on injection vulnerability patches

Y Shi, Y Zhang, T Luo, X Mao, Y Cao, Z Wang… - 31st USENIX Security …, 2022 - usenix.org
Web vulnerabilities, especially injection-related ones, are popular among web application
frameworks (such as Word-Press and Piwigo), which can lead to severe consequences like …