[PDF][PDF] HFL: Hybrid Fuzzing on the Linux Kernel.

K Kim, DR Jeong, CH Kim, Y Jang, I Shin, B Lee - NDSS, 2020 - lifeasageek.github.io
Hybrid fuzzing, combining symbolic execution and fuzzing, is a promising approach for
vulnerability discovery because each approach can complement the other. However, we …

Detecting {Missing-Check} bugs via semantic-and {Context-Aware} criticalness and constraints inferences

K Lu, A Pakki, Q Wu - … USENIX Security Symposium (USENIX Security 19 …, 2019 - usenix.org
Missing a security check is a class of semantic bugs in software programs where erroneous
execution states are not validated. Missing-check bugs are particularly common in OS …

NTFuzz: Enabling type-aware kernel fuzzing on windows with static binary analysis

J Choi, K Kim, D Lee, SK Cha - 2021 IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Although it is common practice for kernel fuzzers to leverage type information of system
calls, current Windows kernel fuzzers do not follow the practice as most system calls are …

{PeX}: A permission check analysis framework for linux kernel

T Zhang, W Shen, D Lee, C Jung, AM Azab… - 28th USENIX Security …, 2019 - usenix.org
Permission checks play an essential role in operating system security by providing access
control to privileged functionalities. However, it is particularly challenging for kernel …

{SHARD}:{Fine-Grained} Kernel Specialization with {Context-Aware} Hardening

M Abubakar, A Ahmad, P Fonseca, D Xu - 30th USENIX Security …, 2021 - usenix.org
With growing hardware complexity and ever-evolving user requirements, the kernel is
increasingly bloated which increases its attack surface. Despite its large size, for specific …

Finding bugs using your own code: detecting functionally-similar yet inconsistent code

M Ahmadi, RM Farkhani, R Williams, L Lu - 30th USENIX security …, 2021 - usenix.org
Probabilistic classification has shown success in detecting known types of software bugs.
However, the works following this approach tend to require a large amount of specimens to …

[PDF][PDF] Precisely characterizing security impact in a flood of patches via symbolic rule comparison

Q Wu, Y He, S McCamant, K Lu - The 2020 Annual Network and …, 2020 - par.nsf.gov
A bug is a vulnerability if it has security impacts when triggered. Determining the security
impacts of a bug is important to both defenders and attackers. Maintainers of large software …

Static detection of unsafe {DMA} accesses in device drivers

JJ Bai, T Li, K Lu, SM Hu - 30th USENIX Security Symposium (USENIX …, 2021 - usenix.org
Direct Memory Access (DMA) is a popular mechanism for improving hardware I/O
performance, and it has been widely used by many existing device drivers. However, DMA …

Segfuzz: Segmentizing thread interleaving to discover kernel concurrency bugs through fuzzing

DR Jeong, B Lee, I Shin, Y Kwon - 2023 IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Discovering kernel concurrency bugs through fuzzing is challenging. Identifying kernel
concurrency bugs, as opposed to non-concurrency bugs, necessitates an analysis of …

Goshawk: Hunting memory corruptions via structure-aware and object-centric memory operation synopsis

Y Lyu, Y Fang, Y Zhang, Q Sun, S Ma… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Existing tools for the automated detection of memory corruption bugs are not very effective in
practice. They typically recognize only standard memory management (MM) APIs (eg …