Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2024JUST ACCEPTED
Software Security Analysis in 2030 and Beyond: A Research Roadmap
ACM Transactions on Software Engineering and Methodology (TOSEM), Just Accepted https://doi.org/10.1145/3708533As our lives, our businesses, and indeed our world economy become increasingly reliant on the secure operation of many interconnected software systems, the software engineering research community is faced with unprecedented research challenges, but also ...
- ArticleDecember 2024
- research-articleOctober 2024
STASE: Static Analysis Guided Symbolic Execution for UEFI Vulnerability Signature Generation
ASE '24: Proceedings of the 39th IEEE/ACM International Conference on Automated Software EngineeringPages 1783–1794https://doi.org/10.1145/3691620.3695543Since its major release in 2006, the Unified Extensible Firmware Interface (UEFI) has become the industry standard for interfacing a computer's hardware and operating system, replacing BIOS. UEFI has higher privileged security access to system resources ...
- research-articleOctober 2024
Quantitative Symbolic Non-Equivalence Analysis
ASE '24: Proceedings of the 39th IEEE/ACM International Conference on Automated Software EngineeringPages 2452–2453https://doi.org/10.1145/3691620.3695324Equivalence analysis focuses on assessing whether different programs, or different versions of a program, exhibit identical behavior. While extensive research has been done on equivalence analysis, there is a lack of detailed and quantitative reasoning ...
- research-articleJanuary 2024
Fuzzing, Symbolic Execution, and Expert Guidance for Better Testing
Hybrid program analysis approaches that combine static and dynamic analysis have resulted in powerful tools for automated software testing. In this article, we argue for hybrid techniques that allow minimal but critical intervention from experts to better ...
-
- research-articleDecember 2023
The Case for Scalable Quantitative Neural Network Analysis
SE4SafeML 2023: Proceedings of the 1st International Workshop on Dependability and Trustworthiness of Safety-Critical Systems with Machine Learned ComponentsPages 22–25https://doi.org/10.1145/3617574.3617862Neural networks are an increasingly common tool for solving problems that require complex analysis and pattern matching, such as identifying stop signs in a self driving car or processing medical imagery during diagnosis. Accordingly, verification of ...
- research-articleJuly 2023
Rare Path Guided Fuzzing
ISSTA 2023: Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 1295–1306https://doi.org/10.1145/3597926.3598136Starting with a random initial seed, fuzzers search for inputs that trigger bugs or vulnerabilities. However, fuzzers often fail to generate inputs for program paths guarded by restrictive branch conditions. In this paper, we show that by first ...
- research-articleJuly 2023
Quantitative Policy Repair for Access Control on the Cloud
ISSTA 2023: Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 564–575https://doi.org/10.1145/3597926.3598078With the growing prevalence of cloud computing, providing secure access to information stored in the cloud has become a critical problem. Due to the complexity of access control policies, administrators may inadvertently allow unintended access to ...
- research-articleJune 2023
Obtaining Information Leakage Bounds via Approximate Model Counting
Proceedings of the ACM on Programming Languages (PACMPL), Volume 7, Issue PLDIArticle No.: 167, Pages 1488–1509https://doi.org/10.1145/3591281Information leaks are a significant problem in modern software systems. In recent years, information theoretic concepts, such as Shannon entropy, have been applied to quantifying information leaks in programs. One recent approach is to use symbolic ...
- research-articleJanuary 2023
Targeted Black-Box Side-Channel Mitigation for IoT✱
IoT '22: Proceedings of the 12th International Conference on the Internet of ThingsPages 49–56https://doi.org/10.1145/3567445.3567447In this paper we present techniques for generating targeted mitigation strategies for network side-channel vulnerabilities in IoT applications. Our tool IoTPatch profiles the target IoT application by capturing the network traffic and labeling the ...
- research-articleNovember 2022
TSA: a tool to detect and quantify network side-channels
ESEC/FSE 2022: Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software EngineeringPages 1760–1764https://doi.org/10.1145/3540250.3558938Mobile applications, Internet of Things devices and web services are pervasive and they all encrypt the communications between servers and clients to not have information leakages. While the network traffic is encrypted, packet sizes and timings are ...
- short-paperJanuary 2023
Quacky: Quantitative Access Control Permissiveness Analyzer✱
ASE '22: Proceedings of the 37th IEEE/ACM International Conference on Automated Software EngineeringArticle No.: 163, Pages 1–5https://doi.org/10.1145/3551349.3559530quacky is a tool for quantifying permissiveness of access control policies in the cloud. Given a policy, quacky translates it into a SMT formula and uses a model counting constraint solver to quantify permissiveness. When given multiple policies, quacky ...
Quantifying permissiveness of access control policies
ICSE '22: Proceedings of the 44th International Conference on Software EngineeringPages 1805–1817https://doi.org/10.1145/3510003.3510233Due to ubiquitous use of software services, protecting the confidentiality of private information stored in compute clouds is becoming an increasingly critical problem. Although access control specification languages and libraries provide mechanisms for ...
PReach: a heuristic for probabilistic reachability to identify hard to reach statements
ICSE '22: Proceedings of the 44th International Conference on Software EngineeringPages 1706–1717https://doi.org/10.1145/3510003.3510227We present a heuristic for approximating the likelihood of reaching a given program statement using 1) branch selectivity (representing the percentage of values that satisfy a branch condition), which we compute using model counting, 2) dependency ...
- research-articleJune 2022
CorbFuzz: checking browser security policies with fuzzing
ASE '21: Proceedings of the 36th IEEE/ACM International Conference on Automated Software EngineeringPages 215–226https://doi.org/10.1109/ASE51524.2021.9678636Browsers use security policies to block malicious behaviors. Cross-Origin Read Blocking (CORB) is a browser security policy for preventing side-channel attacks such as Spectre. We propose a web browser security policy fuzzer called CorbFuzz for checking ...
- research-articleJuly 2020
Feedback-driven side-channel analysis for networked applications
ISSTA 2020: Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 260–271https://doi.org/10.1145/3395363.3397365Information leakage in software systems is a problem of growing importance. Networked applications can leak sensitive information even when they use encryption. For example, some characteristics of network packets, such as their size, timing and ...
- research-articleOctober 2020
JVM fuzzing for JIT-induced side-channel detection
ICSE '20: Proceedings of the ACM/IEEE 42nd International Conference on Software EngineeringPages 1011–1023https://doi.org/10.1145/3377811.3380432Timing side channels arise in software when a program's execution time can be correlated with security-sensitive program input. Recent results on software side-channel detection focus on analysis of program's source code. However, runtime behavior, in ...
- research-articleMay 2020
The Java Pathfinder Workshop 2019
- Cyrille Artho,
- Quoc-Sang Phan,
- Peter Aldous,
- Alyas Almaawi,
- Lucas Bang,
- Lasse Berglund,
- Tevfik Bultan,
- Zhenbang Chen,
- Hayes Converse,
- Wei Dong,
- William Eiers,
- Milos Gligoric,
- Simon Goldsmith,
- Lars Grunske,
- Joshua Hooker,
- Ismet Burak Kadron,
- Timo Kehrer,
- Sarfraz Khurshid,
- Xuan-Bach D. Le,
- David Lo,
- Eric Mercer,
- Sasa Misailovic,
- Egor Namakonov,
- Hoang Lam Nguyen,
- Yannic Noller,
- Benjamin Ogles,
- Rohan Padhye,
- Pavel Parizek,
- Corina S. Păsăreanu,
- S. Jacob Powell,
- Seemanta Saha,
- Koushik Sen,
- Elena Sherman,
- Kyle Storey,
- Minxing Tang,
- Willem Visser,
- Ji Wang,
- Hengbiao Yu
ACM SIGSOFT Software Engineering Notes (SIGSOFT), Volume 45, Issue 2Pages 20–22https://doi.org/10.1145/3385678.3385685Java Path nder (JPF) was originally developed as an explicit- state software model checker, and subsequently evolved into an extensible Java bytecode analysis framework that has been suc- cessfully used to implement techniques such as symbolic and con- ...
- research-articleDecember 2019
Incremental Attack Synthesis
ACM SIGSOFT Software Engineering Notes (SIGSOFT), Volume 44, Issue 4Page 16https://doi.org/10.1145/3364452.336445759Information leakage is a signi cant problem in modern software systems. Information leaks due to side channels are especially hard to detect and analyze. In recent years, techniques have been developed for automated synthesis of adaptive side-channel ...
- research-articleFebruary 2020
Subformula caching for model counting and quantitative program analysis
ASE '19: Proceedings of the 34th IEEE/ACM International Conference on Automated Software EngineeringPages 453–464https://doi.org/10.1109/ASE.2019.00050Quantitative program analysis is an emerging area with applications to software reliability, quantitative information flow, side-channel detection and attack synthesis. Most quantitative program analysis techniques rely on model counting constraint ...