Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
M2HO: Mitigating the Adverse Effects of 5G Handovers on TCP
ACM MobiCom '24: Proceedings of the 30th Annual International Conference on Mobile Computing and NetworkingPages 1089–1103https://doi.org/10.1145/3636534.3690680The advent of 5G promises high bandwidth with the introduction of mmWave technology recently, paving the way for throughput-sensitive applications. However, our measurements in commercial 5G networks show that frequent handovers in 5G, due to physical ...
- research-articleDecember 2024
Top of the Heap: Efficient Memory Error Protection of Safe Heap Objects
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications SecurityPages 1330–1344https://doi.org/10.1145/3658644.3690310Heap memory errors remain a major source of software vulnerabilities. Existing memory safety defenses aim at protecting all objects, resulting in high performance cost and incomplete protection. Instead, we propose an approach that accurately identifies ...
- research-articleDecember 2024
Untangling the Knot: Breaking Access Control in Home Wireless Mesh Networks
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications SecurityPages 2072–2086https://doi.org/10.1145/3658644.3670380Home wireless mesh networks (WMNs) are increasingly gaining popularity for their superior extensibility and signal coverage compared to traditional single-AP wireless networks. In particular, there is a single gateway node and multiple extender nodes ...
- research-articleAugust 2024
OPTISAN: using multiple spatial error defenses to optimize stack memory protection within a budget
SEC '24: Proceedings of the 33rd USENIX Conference on Security SymposiumArticle No.: 402, Pages 7195–7212Spatial memory errors continue to be the cause of many vulnerabilities. While researchers have proposed several defenses to prevent exploitation of spatial memory errors, systems currently rely on defenses that only protect a small fraction of stack data ...
- research-articleAugust 2024
SymBisect: accurate bisection for fuzzer-exposed vulnerabilities
SEC '24: Proceedings of the 33rd USENIX Conference on Security SymposiumArticle No.: 140, Pages 2493–2510The popularity of fuzzing has led to its tight integration into the software development process as a routine part of the build and test, i.e., continuous fuzzing. This has resulted in a substantial increase in the reporting of bugs in open-source ...
-
- research-articleAugust 2024
Don't waste my efforts: pruning redundant sanitizer checks by developer-implemented type checks
SEC '24: Proceedings of the 33rd USENIX Conference on Security SymposiumArticle No.: 80, Pages 1419–1434Type confusion occurs when C or C++ code accesses an object after casting it to an incompatible type. The security impacts of type confusion vulnerabilities are significant, potentially leading to system crashes or even arbitrary code execution. To ...
- research-articleJuly 2024
Comprehensive Memory Safety Validation: An Alternative Approach to Memory Safety
IEEE Security and Privacy (IEEE-SEC-PRIVACY), Volume 22, Issue 4Pages 40–49https://doi.org/10.1109/MSEC.2024.3379947Comprehensive memory safety validation identifies the memory objects whose accesses provably comply with all classes of memory safety, protecting them from memory errors elsewhere at low overhead. We assess the breadth and depth of comprehensive memory ...
Enhancing Static Analysis for Practical Bug Detection: An LLM-Integrated Approach
Proceedings of the ACM on Programming Languages (PACMPL), Volume 8, Issue OOPSLA1Article No.: 111, Pages 474–499https://doi.org/10.1145/3649828While static analysis is instrumental in uncovering software bugs, its precision in analyzing large and intricate codebases remains challenging. The emerging prowess of Large Language Models (LLMs) offers a promising avenue to address these complexities. ...
- research-articleJuly 2024
An Investigation of Patch Porting Practices of the Linux Kernel Ecosystem
MSR '24: Proceedings of the 21st International Conference on Mining Software RepositoriesPages 63–74https://doi.org/10.1145/3643991.3644902Open-source software is increasingly reused, complicating the process of patching to repair bugs. In the case of Linux, a distinct ecosystem has formed, with Linux mainline serving as the upstream, stable or long-term-support (LTS) systems forked from ...
- research-articleNovember 2023
Assisting Static Analysis with Large Language Models: A ChatGPT Experiment
ESEC/FSE 2023: Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software EngineeringPages 2107–2111https://doi.org/10.1145/3611643.3613078Recent advances of Large Language Models (LLMs), e.g., ChatGPT, exhibited strong capabilities of comprehending and responding to questions across a variety of domains. Surprisingly, ChatGPT even possesses a strong understanding of program code. In this ...
- research-articleAugust 2023
A hybrid alias analysis and its application to global variable protection in the linux kernel
SEC '23: Proceedings of the 32nd USENIX Conference on Security SymposiumArticle No.: 236, Pages 4211–4228Global variables in the Linux kernel have been a common target of memory corruption attacks to achieve privilege escalation. Several potential defense mechanisms can be employed to safeguard global variables. One approach involves placing global variables ...
- research-articleFebruary 2023
Unsafe at any copy: name collisions from mixing case sensitivities
FAST'23: Proceedings of the 21st USENIX Conference on File and Storage TechnologiesArticle No.: 12, Pages 183–197File name confusion attacks, such as malicious symlinks and file squatting, have long been studied as sources of security vulnerabilities. However, a recently emerged type, i.e., case-sensitivity-induced name collisions, has not been scrutinized. These ...
- research-articleNovember 2022
Perils and Mitigation of Security Risks of Cooperation in Mobile-as-a-Gateway IoT
CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications SecurityPages 3285–3299https://doi.org/10.1145/3548606.3560590Mobile-as-a-Gateway (MaaG) is a popular feature using mobile devices as gateways to connect IoT devices to cloud services for management. MaaG IoT access control systems support remote access sharing/revocation while allowing "offline availability'' for ...
Demystifying the dependency challenge in kernel fuzzing
ICSE '22: Proceedings of the 44th International Conference on Software EngineeringPages 659–671https://doi.org/10.1145/3510003.3510126Fuzz testing operating system kernels remains a daunting task to date. One known challenge is that much of the kernel code is locked under specific kernel states and current kernel fuzzers are not effective in exploring such an enormous state space. We ...
- research-articleDecember 2021
Eluding ML-based Adblockers With Actionable Adversarial Examples
- Shitong Zhu,
- Zhongjie Wang,
- Xun Chen,
- Shasha Li,
- Keyu Man,
- Umar Iqbal,
- Zhiyun Qian,
- Kevin S. Chan,
- Srikanth V. Krishnamurthy,
- Zubair Shafiq,
- Yu Hao,
- Guoren Li,
- Zheng Zhang,
- Xiaochen Zou
ACSAC '21: Proceedings of the 37th Annual Computer Security Applications ConferencePages 541–553https://doi.org/10.1145/3485832.3488008Online advertisers have been quite successful in circumventing traditional adblockers that rely on manually curated rules to detect ads. As a result, adblockers have started to use machine learning (ML) classifiers for more robust detection and blocking ...
- invited-talkNovember 2021
- proceedingNovember 2021
MTD '21: Proceedings of the 8th ACM Workshop on Moving Target Defense
It is our great pleasure to welcome you to the 2021 ACM Workshop on Moving Target Defense (MTD'21). The mission of MTD is provide a forum for researchers and practitioners in this area to exchange their novel ideas, findings, experiences, and lessons ...
- research-articleNovember 2021
DNS Cache Poisoning Attack: Resurrections with Side Channels
CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications SecurityPages 3400–3414https://doi.org/10.1145/3460120.3486219DNS is one of the fundamental and ancient protocols on the Internet that supports many network applications and services. Unfortunately, DNS was designed without security in mind and is subject to a variety of serious attacks, one of which is the well-...
- research-articleNovember 2021
Statically Discovering High-Order Taint Style Vulnerabilities in OS Kernels
CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications SecurityPages 811–824https://doi.org/10.1145/3460120.3484798Static analysis is known to yield numerous false alarms when used in bug finding, especially for complex vulnerabilities in large code bases like the Linux kernel. One important class of such complex vulnerabilities is what we call "high-order taint ...
- research-articleNovember 2021
Themis: Ambiguity-Aware Network Intrusion Detection based on Symbolic Model Comparison
- Zhongjie Wang,
- Shitong Zhu,
- Keyu Man,
- Pengxiong Zhu,
- Yu Hao,
- Zhiyun Qian,
- Srikanth V. Krishnamurthy,
- Tom La Porta,
- Michael J. De Lucia
CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications SecurityPages 3384–3399https://doi.org/10.1145/3460120.3484762Network intrusion detection systems (NIDS) can be evaded by carefully crafted packets that exploit implementation-level discrepancies between how they are processed on the NIDS and at the endhosts. These discrepancies arise due to the plethora of ...