Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–21 of 21 results for author: She, D

.
  1. arXiv:2406.04517  [pdf, other

    cs.CR

    FOX: Coverage-guided Fuzzing as Online Stochastic Control

    Authors: Dongdong She, Adam Storek, Yuchong Xie, Seoyoung Kweon, Prashast Srivastava, Suman Jana

    Abstract: Fuzzing is an effective technique for discovering software vulnerabilities by generating random test inputs and executing them against the target program. However, fuzzing large and complex programs remains challenging due to difficulties in uncovering deeply hidden vulnerabilities. This paper addresses the limitations of existing coverage-guided fuzzers, focusing on the scheduler and mutator comp… ▽ More

    Submitted 6 June, 2024; originally announced June 2024.

    Comments: To Appear in Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security (CCS '24)

  2. arXiv:2303.14534  [pdf, other

    cond-mat.mtrl-sci cond-mat.mes-hall

    Spin-momentum locking and ultrafast spin-charge conversion in ultrathin epitaxial Bi$_{1-x}$Sb$_x$ topological insulator

    Authors: E. Rongione, L. Baringthon, D. She, G. Patriarche, R. Lebrun, A. Lemaitre, M. Morassi, N. Reyren, M. Micica, J. Mangeney, J. Tignon, F. Bertran, S. Dhillon, P. Le Fevre, H. Jaffres, J. -M. George

    Abstract: The helicity of 3D topological insulator surface states has drawn significant attention in spintronics owing to spin-momentum locking where the carriers' spin is oriented perpendicular to their momentum. This property can provide an efficient method to convert charge currents into spin currents, and vice-versa, through the Rashba-Edelstein effect. However, experimental signatures of these surface… ▽ More

    Submitted 25 March, 2023; originally announced March 2023.

    Comments: 23 pages, 3 figures

  3. arXiv:2303.09900  [pdf, ps, other

    math.RT

    Stability of Rankin-Selberg local $γ$-factors for split classical groups: the symplectic case

    Authors: Taiwang Deng, Dongming She

    Abstract: Given a split classical group of symplectic type and a split general linear group over a local field $F$, we use Langlands-Shahidi method to construct their Rankin-Selberg local $γ$-factors and prove the corresponding analytic stability for generic representations. The idea generalizes the work of J. Cogdell, F. Shahidi, T.-L. Tsai in 2017 and D. She in 2023 in the study of asymptotic behaviors of… ▽ More

    Submitted 17 March, 2023; originally announced March 2023.

    Comments: 35 pages

  4. Dynamical magnetic fields in heavy-ion collisions

    Authors: Anping Huang, Duan She, Shuzhe Shi, Mei Huang, Jinfeng Liao

    Abstract: The magnetic fields in heavy-ion collisions are important ingredients for many interesting phenomena, such as the Chiral Magnetic Effect, Chiral Magnetic Wave, the directed flow $v_1$ of $D^0$ mesons and the splitting of the spin polarization of the $Λ$/$\barΛ$. Quantitative studies of these phenomena however suffer from limited understanding on the dynamical evolution of these fields in the mediu… ▽ More

    Submitted 6 April, 2023; v1 submitted 16 December, 2022; originally announced December 2022.

    Comments: 15 pages, 7 figures

    Journal ref: Phys. Rev. C 107 (2023) 034901

  5. Anomalous magnetohydrodynamics with temperature-dependent electric conductivity and application to the global polarization

    Authors: Hao-Hao Peng, Sihao Wu, Ren-jie Wang, Duan She, Shi Pu

    Abstract: We have derived the solutions of the relativistic anomalous magnetohydrodynamics with longitudinal Bjorken boost invariance and transverse electromagnetic fields in the presence of temperature or energy density dependent electric conductivity. We consider the equations of states in a high temperature limit or in a high chiral chemical potential limit. We obtain both perturbative analytic solutions… ▽ More

    Submitted 21 November, 2022; originally announced November 2022.

  6. arXiv:2210.02853  [pdf, other

    cs.CR cs.LG cs.PL cs.SE

    NeuDep: Neural Binary Memory Dependence Analysis

    Authors: Kexin Pei, Dongdong She, Michael Wang, Scott Geng, Zhou Xuan, Yaniv David, Junfeng Yang, Suman Jana, Baishakhi Ray

    Abstract: Determining whether multiple instructions can access the same memory location is a critical task in binary analysis. It is challenging as statically computing precise alias information is undecidable in theory. The problem aggravates at the binary level due to the presence of compiler optimizations and the absence of symbols and types. Existing approaches either produce significant spurious depend… ▽ More

    Submitted 4 October, 2022; originally announced October 2022.

    Comments: ESEC/FSE 2022

  7. $MC^2$: Rigorous and Efficient Directed Greybox Fuzzing

    Authors: Abhishek Shah, Dongdong She, Samanway Sadhu, Krish Singal, Peter Coffman, Suman Jana

    Abstract: Directed greybox fuzzing is a popular technique for targeted software testing that seeks to find inputs that reach a set of target sites in a program. Most existing directed greybox fuzzers do not provide any theoretical analysis of their performance or optimality. In this paper, we introduce a complexity-theoretic framework to pose directed greybox fuzzing as a oracle-guided search problem wher… ▽ More

    Submitted 30 August, 2022; originally announced August 2022.

    Comments: To Appear in Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (CCS '22)

  8. arXiv:2203.12064  [pdf, other

    cs.CR cs.SI

    Effective Seed Scheduling for Fuzzing with Graph Centrality Analysis

    Authors: Dongdong She, Abhishek Shah, Suman Jana

    Abstract: Seed scheduling, the order in which seeds are selected, can greatly affect the performance of a fuzzer. Existing approaches schedule seeds based on their historical mutation data, but ignore the structure of the underlying Control Flow Graph (CFG). Examining the CFG can help seed scheduling by revealing the potential edge coverage gain from mutating a seed. An ideal strategy will schedule seeds ba… ▽ More

    Submitted 24 March, 2022; v1 submitted 22 March, 2022; originally announced March 2022.

    Comments: To appear in the 43rd IEEE Symposium on Security and Privacy, May 23--26, 2022, San Francisco, CA, USA

  9. Relativistic Viscous Hydrodynamics with Angular Momentum

    Authors: Duan She, Anping Huang, Defu Hou, Jinfeng Liao

    Abstract: Hydrodynamics is a general theoretical framework for describing the long-time large-distance behaviors of various macroscopic physical systems, with its equations based on conservation laws such as energy-momentum conservation and charge conservation. Recently there has been significant interest in understanding the implications of angular momentum conservation for a corresponding hydrodynamic the… ▽ More

    Submitted 3 December, 2022; v1 submitted 9 May, 2021; originally announced May 2021.

    Journal ref: Science Bulletin 67 (2022) 2265-2268

  10. MTFuzz: Fuzzing with a Multi-Task Neural Network

    Authors: Dongdong She, Rahul Krishna, Lu Yan, Suman Jana, Baishakhi Ray

    Abstract: Fuzzing is a widely used technique for detecting software bugs and vulnerabilities. Most popular fuzzers generate new inputs using an evolutionary search to maximize code coverage. Essentially, these fuzzers start with a set of seed inputs, mutate them to generate new inputs, and identify the promising inputs using an evolutionary fitness function for further mutation. Despite their success, evolu… ▽ More

    Submitted 11 September, 2020; v1 submitted 25 May, 2020; originally announced May 2020.

    Comments: ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE) 2020

  11. Accelerating longitudinal expansion of resistive relativistic-magneto-hydrodynamics in heavy ion collisions

    Authors: M. Haddadi Moghaddam, W. M. Alberico, Duan She, A. F. Kord, B. Azadegan

    Abstract: We study the evolution of the longitudinal expansion of an ideal fluid with finite electrical conductivity, which is subject to the EM fields. In the framework of resistive relativistic-magneto-hydrodynamic, we find an exact analytical solution for the EM fields and for the acceleration of the fluid.

    Submitted 22 February, 2020; originally announced February 2020.

    Comments: 9 pages, 12 figures

    Journal ref: Phys. Rev. D 102, 014017 (2020)

  12. Perturbation solutions of relativistic viscous hydrodynamics for longitudinally expanding fireballs

    Authors: Ze-Fang Jiang, Duan She, C. B. Yang, Defu Hou

    Abstract: The solutions of relativistic viscous hydrodynamics for longitudinal expanding fireballs is investigated with the Navier-Stokes theory and Israel-Stewart theory. The energy and Euler conservation equations for the viscous fluid are derived in Rindler coordinates with the longitudinal expansion effect is small. Under the perturbation assumption, an analytical perturbation solution for the Navier-St… ▽ More

    Submitted 30 April, 2020; v1 submitted 26 January, 2020; originally announced January 2020.

    Comments: 8 pages, 6 figures, ansatz of the viscous hydrodynamics, welcome comments

  13. Chiral magnetic effect for chiral fermion system

    Authors: Ren-Da Dong, Ren-Hong Fang, De-Fu Hou, Duan She

    Abstract: We concisely derive chiral magnetic effect through Wigner function approach for chiral fermion system. Then we derive chiral magnetic effect through solving the Landau levels of chiral fermions in detail. The procedures of second quantization and ensemble average lead to the equation of chiral magnetic effect for righthand and lefthand fermion systems. Chiral magnetic effect only comes from the co… ▽ More

    Submitted 16 January, 2020; originally announced January 2020.

  14. arXiv:1911.03428  [pdf, ps, other

    math.NT math.RT

    Stability of symmetric cube gamma factors for GL(2)

    Authors: Daniel Shankman, Dongming She

    Abstract: We give a new proof of the stability of the symmetric cube gamma factor as defined by the Langlands-Shahidi method.

    Submitted 8 November, 2019; originally announced November 2019.

  15. arXiv:1910.02525  [pdf, ps, other

    math.NT

    Local Langlands correspondence for the twisted exterior and symmetric square $ε$-factors of $\textrm{GL}_n$

    Authors: Dongming She

    Abstract: Let $F$ be a non-Archimedean local field. Let $\mathcal{A}_n(F)$ be the set of equivalence classes of irreducible admissible representations of $\textrm{GL}_n(F)$, and $\mathcal{G}_n(F)$ be the set of equivalence classes of n-dimensional Frobenius semisimple Weil-Deligne representations of $W'_F$. The local Langlands correspondence(LLC) establishes the reciprocity maps… ▽ More

    Submitted 3 May, 2020; v1 submitted 6 October, 2019; originally announced October 2019.

    Comments: arXiv admin note: text overlap with arXiv:1412.1448 by other authors

  16. arXiv:1909.03461  [pdf, other

    cs.CR

    Fine Grained Dataflow Tracking with Proximal Gradients

    Authors: Gabriel Ryan, Abhishek Shah, Dongdong She, Koustubha Bhat, Suman Jana

    Abstract: Dataflow tracking with Dynamic Taint Analysis (DTA) is an important method in systems security with many applications, including exploit analysis, guided fuzzing, and side-channel information leak detection. However, DTA is fundamentally limited by the Boolean nature of taint labels, which provide no information about the significance of detected dataflows and lead to false positives/negatives on… ▽ More

    Submitted 24 February, 2021; v1 submitted 8 September, 2019; originally announced September 2019.

    Comments: To appear in USENIX Security 2021

  17. arXiv:1907.03756  [pdf, other

    cs.CR

    Neutaint: Efficient Dynamic Taint Analysis with Neural Networks

    Authors: Dongdong She, Yizheng Chen, Abhishek Shah, Baishakhi Ray, Suman Jana

    Abstract: Dynamic taint analysis (DTA) is widely used by various applications to track information flow during runtime execution. Existing DTA techniques use rule-based taint-propagation, which is neither accurate (i.e., high false positive) nor efficient (i.e., large runtime overhead). It is hard to specify taint rules for each operation while covering all corner cases correctly. Moreover, the overtaint an… ▽ More

    Submitted 3 September, 2019; v1 submitted 8 July, 2019; originally announced July 2019.

    Comments: To appear in the 41th IEEE Symposium on Security and Privacy, May 18--20, 2020, San Francisco, CA, USA

  18. 1+1 dimensional relativistic magnetohydrodynamics with longitudinal acceleration

    Authors: Duan She, Ze Fang Jiang, De-fu Hou, C. B. Yang

    Abstract: Non-central heavy-ion collisions generate the strongest magnetic field of the order of $10^{18}-10^{19}$ Gauss due to the electric current produced by the positively charged spectators that travel at nearly the speed of light. Such transient electromagnetic fields may induce various novel effects in the hydrodynamic description of the quark gluon plasma for non-central heavy-ion collisions. We inv… ▽ More

    Submitted 2 July, 2019; originally announced July 2019.

    Comments: 9 pages, 9 figures, in Revtex

    Journal ref: Phys. Rev. D 100, 116014 (2019)

  19. arXiv:1904.03542  [pdf, other

    cs.CR cs.LG

    On Training Robust PDF Malware Classifiers

    Authors: Yizheng Chen, Shiqi Wang, Dongdong She, Suman Jana

    Abstract: Although state-of-the-art PDF malware classifiers can be trained with almost perfect test accuracy (99%) and extremely low false positive rate (under 0.1%), it has been shown that even a simple adversary can evade them. A practically useful malware classifier must be robust against evasion attacks. However, achieving such robustness is an extremely challenging task. In this paper, we take the fi… ▽ More

    Submitted 3 December, 2019; v1 submitted 6 April, 2019; originally announced April 2019.

    Comments: USENIX Security 2020

  20. arXiv:1807.05620  [pdf, other

    cs.CR cs.LG

    NEUZZ: Efficient Fuzzing with Neural Program Smoothing

    Authors: Dongdong She, Kexin Pei, Dave Epstein, Junfeng Yang, Baishakhi Ray, Suman Jana

    Abstract: Fuzzing has become the de facto standard technique for finding software vulnerabilities. However, even state-of-the-art fuzzers are not very efficient at finding hard-to-trigger software bugs. Most popular fuzzers use evolutionary guidance to generate inputs that can trigger different bugs. Such evolutionary algorithms, while fast and simple to implement, often get stuck in fruitless sequences of… ▽ More

    Submitted 12 July, 2019; v1 submitted 15 July, 2018; originally announced July 2018.

    Comments: To appear in the 40th IEEE Symposium on Security and Privacy, May 20--22, 2019, San Francisco, CA, USA

  21. Chiral magnetic currents with QGP medium response in heavy ion collisions at RHIC and LHC energies

    Authors: Duan She, Sheng-Qin Feng, Yang Zhong, Zhong-Bao Yin

    Abstract: We calculate the electromagnetic current with a more realistic approach in the RHIC and LHC energy regions in the article. We take the partons formation time as the initial time of the magnetic field response of QGP medium. The maximum electromagnetic current and the time-integrated current are two important characteristics of the chiral magnetic effect (CME), which can characterize the intensity… ▽ More

    Submitted 25 March, 2018; v1 submitted 14 September, 2017; originally announced September 2017.

    Comments: 10 pages, 12 figure

    Journal ref: Eur. Phys. J. A (2018) 54: 48