Mitigating Security Risks in Linux with {KLAUS}: A Method for Evaluating Patch Correctness
The Linux kernel's growth introduces daily bugs that are often detected and eliminated using
code analyzers. However, creating accurate Linux patches remains challenging and poses …
code analyzers. However, creating accurate Linux patches remains challenging and poses …
SyzRisk: A Change-Pattern-Based Continuous Kernel Regression Fuzzer
Syzbot continuously fuzzes the full Linux kernel to discover latent bugs. Yet, around 75% of
recent kernel bugs are caused by recent patches, dubbed regression bugs. Regression …
recent kernel bugs are caused by recent patches, dubbed regression bugs. Regression …
Poracle: Testing Patches under Preservation Conditions to Combat the Overfitting Problem of Program Repair
To date, the users of test-driven program repair tools suffer from the overfitting problem; a
generated patch may pass all available tests without being correct. In the existing work …
generated patch may pass all available tests without being correct. In the existing work …
SCVMON: Data-oriented attack recovery for RVs based on safety-critical variable monitoring
There are many various data-oriented attacks on robotic vehicles (RVs) that change the
inputs of an RV control program. While much research has been dedicated to detecting the …
inputs of an RV control program. While much research has been dedicated to detecting the …
A Systematic Study of Physical Sensor Attack Hardness
Physical sensor attacks against robotic vehicles (RV) have become a serious concern due to
their prevalence and potential physical threat. However, RV software developers often do …
their prevalence and potential physical threat. However, RV software developers often do …
Mokav: Execution-driven Differential Testing with LLMs
It is essential to detect functional differences in various software engineering tasks, such as
automated program repair, mutation testing, and code refactoring. The problem of detecting …
automated program repair, mutation testing, and code refactoring. The problem of detecting …
RUSPATCH: Towards Timely and Effectively Patching Rust Applications
Y Wu, B Hua - 2023 IEEE 23rd International Conference on …, 2023 - ieeexplore.ieee.org
Despite the fact that Rust is designed to be a secure programming language for system
programming, it is still vulnerable and exploitable due to its inclusion of an unsafe sub …
programming, it is still vulnerable and exploitable due to its inclusion of an unsafe sub …
DEFEATING CYBER AND PHYSICAL ATTACKS IN ROBOTIC VEHICLES
H Kim - 2023 - hammer.purdue.edu
The world is increasingly dependent on cyber-physical systems (CPSs), eg, robotic vehicles
(RVs) and industrial control systems (ICSs). CPSs operate autonomously by processing data …
(RVs) and industrial control systems (ICSs). CPSs operate autonomously by processing data …
TRACE DATA-DRIVEN DEFENSE AGAINST CYBER AND CYBER-PHYSICAL ATTACKS. pdf
AAM Alsaheel - 2023 - hammer.purdue.edu
In the contemporary digital era, Advanced Persistent Threat (APT) attacks are evolving,
becoming increasingly sophisticated, and now perilously targeting critical cyber-physical …
becoming increasingly sophisticated, and now perilously targeting critical cyber-physical …
[PDF][PDF] TRACE DATA-DRIVEN DEFENSE AGAINST CYBER AND CYBER-PHYSICAL ATTACKS
A Alsaheel - 2023 - hammer.purdue.edu
2 TRACE-DRIVEN CYBER ATTACK INVESTIGATIONS............... 2.1 Introduction.......................
............. 2.2 Motivation and Definitions............................. 2.2. 1 Definitions …
............. 2.2 Motivation and Definitions............................. 2.2. 1 Definitions …