Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2020
A Flexible Framework for Expediting Bug Finding by Leveraging Past (Mis-)Behavior to Discover New Bugs
ACSAC '20: Proceedings of the 36th Annual Computer Security Applications ConferencePages 345–359https://doi.org/10.1145/3427228.3427269Among various fuzzing approaches, coverage-guided grey-box fuzzing is perhaps the most prominent, due to its ease of use and effectiveness. Using this approach, the selection of inputs focuses on maximizing program coverage, e.g., in terms of the ...
- research-articleDecember 2020
Cupid : Automatic Fuzzer Selection for Collaborative Fuzzing
- Emre Güler,
- Philipp Görz,
- Elia Geretto,
- Andrea Jemmett,
- Sebastian Österlund,
- Herbert Bos,
- Cristiano Giuffrida,
- Thorsten Holz
ACSAC '20: Proceedings of the 36th Annual Computer Security Applications ConferencePages 360–372https://doi.org/10.1145/3427228.3427266Combining the strengths of individual fuzzing methods is an appealing idea to find software faults more efficiently, especially when the computing budget is limited. In prior work, EnFuzz introduced the idea of ensemble fuzzing and devised three ...
- research-articleDecember 2020
This is Why We Can’t Cache Nice Things: Lightning-Fast Threat Hunting using Suspicion-Based Hierarchical Storage
- Wajih Ul Hassan,
- Ding Li,
- Kangkook Jee,
- Xiao Yu,
- Kexuan Zou,
- Dawei Wang,
- Zhengzhang Chen,
- Zhichun Li,
- Junghwan Rhee,
- Jiaping Gui,
- Adam Bates
ACSAC '20: Proceedings of the 36th Annual Computer Security Applications ConferencePages 165–178https://doi.org/10.1145/3427228.3427255Recent advances in the causal analysis can accelerate incident response time, but only after a causal graph of the attack has been constructed. Unfortunately, existing causal graph generation techniques are mainly offline and may take hours or days to ...
- research-articleDecember 2020
App-Agnostic Post-Execution Semantic Analysis of Android In-Memory Forensics Artifacts
ACSAC '20: Proceedings of the 36th Annual Computer Security Applications ConferencePages 28–41https://doi.org/10.1145/3427228.3427244Over the last decade, userland memory forensics techniques and algorithms have gained popularity among practitioners, as they have proven to be useful in real forensics and cybercrime investigations. These techniques analyze and recover objects and ...
- research-articleDecember 2020
Talek: Private Group Messaging with Hidden Access Patterns
- Raymond Cheng,
- William Scott,
- Elisaweta Masserova,
- Irene Zhang,
- Vipul Goyal,
- Thomas Anderson,
- Arvind Krishnamurthy,
- Bryan Parno
ACSAC '20: Proceedings of the 36th Annual Computer Security Applications ConferencePages 84–99https://doi.org/10.1145/3427228.3427231Talek is a private group messaging system that sends messages through potentially untrustworthy servers, while hiding both data content and the communication patterns among its users. Talek explores a new point in the design space of private messaging; ...