Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- extended-abstractAugust 2019
Rethinking Regex engines to address ReDoS
ESEC/FSE 2019: Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software EngineeringPages 1256–1258https://doi.org/10.1145/3338906.3342509Regular expressions (regexes) are a powerful string manipulation tool. Unfortunately, in programming languages like Python, Java, and JavaScript, they are unnecessarily dangerous, implemented with worst-case exponential matching behavior. This high time ...
- extended-abstractAugust 2019
On the scalable dynamic taint analysis for distributed systems
ESEC/FSE 2019: Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software EngineeringPages 1247–1249https://doi.org/10.1145/3338906.3342506To protect the privacy and search sensitive data leaks, we must solve multiple challenges (e.g., applicability, portability, and scalability) for developing an appropriate taint analysis for distributed systems.We hence present DistTaint, a dynamic ...
- extended-abstractAugust 2019
Efficient computing in a safe environment
ESEC/FSE 2019: Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software EngineeringPages 1208–1210https://doi.org/10.1145/3338906.3342491Modern computer systems are facing security challenges and thus are forced to employ various encryption, mitigation mechanisms, and other measures that affect significantly their performance. In this study, we aim to identify the energy and run-time ...
- short-paperAugust 2019
Machine-learning supported vulnerability detection in source code
ESEC/FSE 2019: Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software EngineeringPages 1180–1183https://doi.org/10.1145/3338906.3341466The awareness of writing secure code rises with the increasing number of attacks and their resultant damage. But often, software developers are no security experts and vulnerabilities arise unconsciously during the development process. They use static ...
- research-articleAugust 2019
A dynamic taint analyzer for distributed systems
ESEC/FSE 2019: Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software EngineeringPages 1115–1119https://doi.org/10.1145/3338906.3341179As in other software domains, information flow security is a fundamental aspect of code security in distributed systems. However, most existing solutions to information flow security are limited to centralized software. For distributed systems, such ...
- research-articleAugust 2019
JCOMIX: a search-based tool to detect XML injection vulnerabilities in web applications
ESEC/FSE 2019: Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software EngineeringPages 1090–1094https://doi.org/10.1145/3338906.3341178Input sanitization and validation of user inputs are well-established protection mechanisms for microservice architectures against XML injection attacks (XMLi). The effectiveness of the protection mechanisms strongly depends on the quality of the ...
- research-articleAugust 2019
DISCOVER: detecting algorithmic complexity vulnerabilities
ESEC/FSE 2019: Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software EngineeringPages 1129–1133https://doi.org/10.1145/3338906.3341177Algorithmic Complexity Vulnerabilities (ACV) are a class of vulnerabilities that enable Denial of Service Attacks. ACVs stem from asymmetric consumption of resources due to complex loop termination logic, recursion, and/or resource intensive library ...
- research-articleAugust 2019
Developing secure bitcoin contracts with BitML
ESEC/FSE 2019: Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software EngineeringPages 1124–1128https://doi.org/10.1145/3338906.3341173We present a toolchain for developing and verifying smart contracts that can be executed on Bitcoin. The toolchain is based on BitML, a recent domain-specific language for smart contracts with a computationally sound embedding into Bitcoin. Our ...
- research-articleAugust 2019Best Paper
FUDGE: fuzz driver generation at scale
- Domagoj Babić,
- Stefan Bucur,
- Yaohui Chen,
- Franjo Ivančić,
- Tim King,
- Markus Kusano,
- Caroline Lemieux,
- László Szekeres,
- Wei Wang
ESEC/FSE 2019: Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software EngineeringPages 975–985https://doi.org/10.1145/3338906.3340456At Google we have found tens of thousands of security and robustness bugs by fuzzing C and C++ libraries. To fuzz a library, a fuzzer requires a fuzz driver—which exercises some library code—to which it can pass inputs. Unfortunately, writing fuzz ...
- research-articleAugust 2019
Cerebro: context-aware adaptive fuzzing for effective vulnerability detection
ESEC/FSE 2019: Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software EngineeringPages 533–544https://doi.org/10.1145/3338906.3338975Existing greybox fuzzers mainly utilize program coverage as the goal to guide the fuzzing process. To maximize their outputs, coverage-based greybox fuzzers need to evaluate the quality of seeds properly, which involves making two decisions: 1) which is ...
- research-articleAugust 2019
Achilles’ heel of plug-and-Play software architectures: a grounded theory based approach
ESEC/FSE 2019: Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software EngineeringPages 671–682https://doi.org/10.1145/3338906.3338969Through a set of well-defined interfaces, plug-and-play architectures enable additional functionalities to be added or removed from a system at its runtime. However, plug-ins can also increase the application’s attack surface or introduce untrusted ...
- research-articleAugust 2019
Mitigating power side channels during compilation
ESEC/FSE 2019: Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software EngineeringPages 590–601https://doi.org/10.1145/3338906.3338913The code generation modules inside modern compilers, which use a limited number of CPU registers to store a large number of program variables, may introduce side-channel leaks even in software equipped with state-of-the-art countermeasures. We propose a ...