Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleMay 2024
GWP-ASan: Sampling-Based Detection of Memory-Safety Bugs in Production
- Kostya Serebryany,
- Chris Kennelly,
- Mitch Phillips,
- Matt Denton,
- Marco Elver,
- Alexander Potapenko,
- Matt Morehouse,
- Vlad Tsyrklevich,
- Christian Holler,
- Julian Lettner,
- David Kilzer,
- Lander Brandt
ICSE-SEIP '24: Proceedings of the 46th International Conference on Software Engineering: Software Engineering in PracticePages 168–177https://doi.org/10.1145/3639477.3640328Despite the recent advances in pre-production bug detection, heap-use-after-free and heap-buffer-overflow bugs remain the primary problem for security, reliability, and developer productivity for applications written in C or C++, across all major ...
- research-articleMarch 2024
MUPPET: Optimizing Performance in OpenMP via Mutation Testing
PMAM '24: Proceedings of the 15th International Workshop on Programming Models and Applications for Multicores and ManycoresPages 22–31https://doi.org/10.1145/3649169.3649246Performance optimization continues to be a challenge in modern HPC software. Existing performance optimization techniques, including profiling-based and auto-tuning techniques, fail to indicate program modifications at the source level thus preventing ...
- research-articleDecember 2023
MicroProf: Code-level Attribution of Unnecessary Data Transfer in Microservice Applications
ACM Transactions on Architecture and Code Optimization (TACO), Volume 20, Issue 4Article No.: 50, Pages 1–26https://doi.org/10.1145/3622787The microservice architecture style has gained popularity due to its ability to fault isolation, ease of scaling applications, and developer’s agility. However, writing applications in the microservice design style has its challenges. Due to the loosely ...
- ArticleNovember 2023
Using Page Offsets for Detecting Control-Flow Anomalies
- Engincan Varan,
- Khadija Hanifi,
- Aysegul Rana Erdemli,
- Musa Unal,
- Yunus Emre Tat,
- Dilara Tekinoglu,
- Orcun Cetin,
- Ramin Fuladi,
- Cemal Yilmaz
Innovative Security Solutions for Information Technology and CommunicationsPages 13–25https://doi.org/10.1007/978-3-031-52947-4_2AbstractIn this study, we introduce an approach that leverages memory-page offsets as an abstraction mechanism for real-time detection of control-flow-affecting cyberattacks. We, in particular, leverage page offsets for a number of reasons. First, being a ...
- research-articleJuly 2023
Learning Test Input Constraints from Branch Conditions
ICSE '23: Proceedings of the 45th International Conference on Software Engineering: Companion ProceedingsPages 248–250https://doi.org/10.1109/ICSE-Companion58688.2023.00067Precise input specifications are the holy grail of blackbox test generation. In order to test programs that process structured inputs effectively, inputs should match the expected input format. Otherwise, they are likely to be rejected during initial ...
-
signatr: A Data-Driven Fuzzing Tool for R
SLE 2022: Proceedings of the 15th ACM SIGPLAN International Conference on Software Language EngineeringPages 216–221https://doi.org/10.1145/3567512.3567530The fast-and-loose, permissive semantics of dynamic programming languages limit the power of static analyses. For that reason, soundness is often traded for precision through dynamic program analysis. Dynamic analysis is only as good as the ...
- research-articleNovember 2022
MetaEmu: An Architecture Agnostic Rehosting Framework for Automotive Firmware
CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications SecurityPages 515–529https://doi.org/10.1145/3548606.3559338In this paper we present MetaEmu, an architecture-agnostic framework geared towards rehosting and security analysis of automotive firmware. MetaEmu improves over existing rehosting environments in two ways: Firstly, it solves the hitherto open-problem ...
- short-paperJanuary 2023
Augur: Dynamic Taint Analysis for Asynchronous JavaScript
ASE '22: Proceedings of the 37th IEEE/ACM International Conference on Automated Software EngineeringArticle No.: 153, Pages 1–4https://doi.org/10.1145/3551349.3559522Dynamic taint analysis (DTA) is a popular approach to help protect JavaScript applications against injection vulnerabilities. In 2016, the ECMAScript 7 JavaScript language standard introduced many language features that most existing DTA tools for ...
- research-articleJuly 2022
Probe-based syscall tracing for efficient and practical file-level test traces
AST '22: Proceedings of the 3rd ACM/IEEE International Conference on Automation of Software TestPages 126–137https://doi.org/10.1145/3524481.3527239Efficiently collecting per-test execution traces is a common prerequisite of dynamic regression test optimization techniques. However, as these test traces are typically recorded through language-specific code instrumentation, non-code artifacts and ...
- research-articleApril 2022
Efficient data race detection of async-finish programs using vector clocks
PMAM '22: Proceedings of the Thirteenth International Workshop on Programming Models and Applications for Multicores and ManycoresPages 45–54https://doi.org/10.1145/3528425.3529101Existing data race detectors for task-based programs incur significant run time and space overheads. The overheads arise because of frequent lookups in fine-grained tree data structures to check whether two accesses can happen in parallel. This work ...
- research-articleJune 2022
Dynamic generation of python bindings for HPC kernels
ASE '21: Proceedings of the 36th IEEE/ACM International Conference on Automated Software EngineeringPages 92–103https://doi.org/10.1109/ASE51524.2021.9678726Traditionally, high performance kernels (HPKs) have been written in statically typed languages, such as C/C++ and Fortran. A recent trend among scientists---prototyping applications in dynamic languages such as Python---created a gap between the ...
- demonstrationNovember 2021
Demo: Detecting Third-Party Library Problems with Combined Program Analysis
CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications SecurityPages 2429–2431https://doi.org/10.1145/3460120.3485351Third-party libraries ease the software development process and thus have become an integral part of modern software engineering. Unfortunately, they are not usually vetted by human developers and thus are often responsible for introducing bugs, ...
- research-articleJune 2021
SoK: Enabling Security Analyses of Embedded Systems via Rehosting
- Andrew Fasano,
- Tiemoko Ballo,
- Marius Muench,
- Tim Leek,
- Alexander Bulekov,
- Brendan Dolan-Gavitt,
- Manuel Egele,
- Aurélien Francillon,
- Long Lu,
- Nick Gregory,
- Davide Balzarotti,
- William Robertson
ASIA CCS '21: Proceedings of the 2021 ACM Asia Conference on Computer and Communications SecurityPages 687–701https://doi.org/10.1145/3433210.3453093Closely monitoring the behavior of a software system during its execution enables developers and analysts to observe, and ultimately understand, how it works. This kind of dynamic analysis can be instrumental to reverse engineering, vulnerability ...
ELFies: executable region checkpoints for performance analysis and simulation
CGO '21: Proceedings of the 2021 IEEE/ACM International Symposium on Code Generation and OptimizationPages 126–136https://doi.org/10.1109/CGO51591.2021.9370340We address the challenge faced in characterizing long-running workloads, namely how to reliably focus the detailed analysis on interesting execution regions. We present a set of tools that allows users to precisely capture any region of interest in ...
- research-articleDecember 2020
Automated Patch Transplantation
ACM Transactions on Software Engineering and Methodology (TOSEM), Volume 30, Issue 1Article No.: 6, Pages 1–36https://doi.org/10.1145/3412376Automated program repair is an emerging area that attempts to patch software errors and vulnerabilities. In this article, we formulate and study a problem related to automated repair, namely automated patch transplantation. A patch for an error in a ...
- research-articleOctober 2020
Characterizing Energy Consumption of Third-Party API Libraries using API Utilization Profiles
ESEM '20: Proceedings of the 14th ACM / IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)Article No.: 8, Pages 1–11https://doi.org/10.1145/3382494.3410688Background: Third-party software libraries often serve as fundamental building blocks for developing applications. However, depending on such libraries for development raises a new concern, energy consumption, which has become of increased interest for ...
- research-articleJuly 2020
Feedback-driven side-channel analysis for networked applications
ISSTA 2020: Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and AnalysisPages 260–271https://doi.org/10.1145/3395363.3397365Information leakage in software systems is a problem of growing importance. Networked applications can leak sensitive information even when they use encryption. For example, some characteristics of network packets, such as their size, timing and ...
Atomicity Checking in Linear Time using Vector Clocks
ASPLOS '20: Proceedings of the Twenty-Fifth International Conference on Architectural Support for Programming Languages and Operating SystemsPages 183–199https://doi.org/10.1145/3373376.3378475Multi-threaded programs are challenging to write. Developers often need to reason about a prohibitively large number of thread interleavings to reason about the behavior of software. A non-interference property like atomicity can reduce this ...
- research-articleDecember 2019
Processor-Oblivious Record and Replay
ACM Transactions on Parallel Computing (TOPC), Volume 6, Issue 4Article No.: 20, Pages 1–28https://doi.org/10.1145/3365659Record-and-replay systems are useful tools for debugging non-deterministic parallel programs by first recording an execution and then replaying that execution to produce the same access pattern. Existing record-and-replay systems generally target thread-...
- short-paperNovember 2019
LinkRadar: Assisting the Analysis of Inter-app Page Links via Transfer Learning
CIKM '19: Proceedings of the 28th ACM International Conference on Information and Knowledge ManagementPages 2077–2080https://doi.org/10.1145/3357384.3358094Analyzing links among pages from different mobile apps is an important task of app analysis. Currently, most efforts of analyzing inter-app page links rely on static program analysis, which produces a lot of false positives, requiring significant manual ...