Skip to main content

Showing 1–10 of 10 results for author: Reaves, B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2409.02839  [pdf, other

    cs.CR cs.CY cs.NI

    Jäger: Automated Telephone Call Traceback

    Authors: David Adei, Varun Madathil, Sathvik Prasad, Bradley Reaves, Alessandra Scafuro

    Abstract: Unsolicited telephone calls that facilitate fraud or unlawful telemarketing continue to overwhelm network users and the regulators who prosecute them. The first step in prosecuting phone abuse is traceback -- identifying the call originator. This fundamental investigative task currently requires hours of manual effort per call. In this paper, we introduce Jäger, a distributed secure call traceback… ▽ More

    Submitted 17 September, 2024; v1 submitted 4 September, 2024; originally announced September 2024.

    Comments: In Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security (CCS '24), October 14---18, 2024, Salt Lake City, UT, USA. ACM, New York, NY, USA, 24 pages

  2. arXiv:2403.19072  [pdf, other

    cs.CR cs.SE

    AssetHarvester: A Static Analysis Tool for Detecting Assets Protected by Secrets in Software Artifacts

    Authors: Setu Kumar Basak, K. Virgil English, Ken Ogura, Vitesh Kambara, Bradley Reaves, Laurie Williams

    Abstract: GitGuardian monitored secrets exposure in public GitHub repositories and reported developers leaked over 12 million secrets (database and other credentials) in 2023, indicating a 113% surge from 2021. Despite the availability of secret detection tools, developers ignore the tools' reported warnings because of false positives (25%-99%). However, each secret protects assets of different values acces… ▽ More

    Submitted 27 March, 2024; originally announced March 2024.

  3. arXiv:2311.01532  [pdf, other

    cs.CR

    VFCFinder: Seamlessly Pairing Security Advisories and Patches

    Authors: Trevor Dunlap, Elizabeth Lin, William Enck, Bradley Reaves

    Abstract: Security advisories are the primary channel of communication for discovered vulnerabilities in open-source software, but they often lack crucial information. Specifically, 63% of vulnerability database reports are missing their patch links, also referred to as vulnerability fixing commits (VFCs). This paper introduces VFCFinder, a tool that generates the top-five ranked set of VFCs for a given sec… ▽ More

    Submitted 2 November, 2023; originally announced November 2023.

  4. arXiv:2307.00714  [pdf, other

    cs.CR cs.SE

    A Comparative Study of Software Secrets Reporting by Secret Detection Tools

    Authors: Setu Kumar Basak, Jamison Cox, Bradley Reaves, Laurie Williams

    Abstract: Background: According to GitGuardian's monitoring of public GitHub repositories, secrets sprawl continued accelerating in 2022 by 67% compared to 2021, exposing over 10 million secrets (API keys and other credentials). Though many open-source and proprietary secret detection tools are available, these tools output many false positives, making it difficult for developers to take action and teams to… ▽ More

    Submitted 2 July, 2023; originally announced July 2023.

    Comments: Accepted at the Technical Track of the International Symposium on Empirical Software Engineering and Measurement (ESEM 2023)

  5. arXiv:2303.06729  [pdf, other

    cs.CR cs.SE

    SecretBench: A Dataset of Software Secrets

    Authors: Setu Kumar Basak, Lorenzo Neil, Bradley Reaves, Laurie Williams

    Abstract: According to GitGuardian's monitoring of public GitHub repositories, the exposure of secrets (API keys and other credentials) increased two-fold in 2021 compared to 2020, totaling more than six million secrets. However, no benchmark dataset is publicly available for researchers and tool developers to evaluate secret detection tools that produce many false positive warnings. The goal of our paper i… ▽ More

    Submitted 12 March, 2023; originally announced March 2023.

    Comments: Accepted at the Data and Tool Showcase Track of the 20th International Conference on Mining Software Repositories (MSR 2023)

  6. arXiv:2301.12377  [pdf, other

    cs.SE cs.CR

    What Challenges Do Developers Face About Checked-in Secrets in Software Artifacts?

    Authors: Setu Kumar Basak, Lorenzo Neil, Bradley Reaves, Laurie Williams

    Abstract: Throughout 2021, GitGuardian's monitoring of public GitHub repositories revealed a two-fold increase in the number of secrets (database credentials, API keys, and other credentials) exposed compared to 2020, accumulating more than six million secrets. To our knowledge, the challenges developers face to avoid checked-in secrets are not yet characterized. The goal of our paper is to aid researchers… ▽ More

    Submitted 29 January, 2023; originally announced January 2023.

    Comments: This paper is accepted at the International Conference on Software Engineering (ICSE) 2023

  7. arXiv:2208.11280  [pdf, other

    cs.SE cs.CR

    What are the Practices for Secret Management in Software Artifacts?

    Authors: Setu Kumar Basak, Lorenzo Neil, Bradley Reaves, Laurie Williams

    Abstract: Throughout 2021, GitGuardian's monitoring of public GitHub repositories revealed a two-fold increase in the number of secrets (database credentials, API keys, and other credentials) exposed compared to 2020, accumulating more than six million secrets. A systematic derivation of practices for managing secrets can help practitioners in secure development. The goal of our paper is to aid practitioner… ▽ More

    Submitted 23 August, 2022; originally announced August 2022.

    Comments: 8 pages, 2 figures. This paper is to be published in IEEE Secure Development Conference, 2022

    MSC Class: 68-01

  8. arXiv:2104.06515  [pdf, other

    cs.CR

    A First Look at Scams on YouTube

    Authors: Elijah Bouma-Sims, Brad Reaves

    Abstract: YouTube has become the second most popular website according to Alexa, and it represents an enticing platform for scammers to attract victims. Because of the computational difficulty of classifying multimedia, identifying scams on YouTube is more difficult than text-based media. As a consequence, the research community to-date has provided little insight into the prevalence, lifetime, and operatio… ▽ More

    Submitted 13 April, 2021; originally announced April 2021.

    Comments: Presented at the Workshop on Measurements, Attacks, and Defenses for the Web (MADWeb) 2021 hosted at NDSS '21

  9. arXiv:1801.02742  [pdf, other

    cs.CR

    A Large Scale Investigation of Obfuscation Use in Google Play

    Authors: Dominik Wermke, Nicolas Huaman, Yasemin Acar, Brad Reaves, Patrick Traynor, Sascha Fahl

    Abstract: Android applications are frequently plagiarized or repackaged, and software obfuscation is a recommended protection against these practices. However, there is very little data on the overall rates of app obfuscation, the techniques used, or factors that lead to developers to choose to obfuscate their apps. In this paper, we present the first comprehensive analysis of the use of and challenges to s… ▽ More

    Submitted 20 February, 2018; v1 submitted 8 January, 2018; originally announced January 2018.

  10. arXiv:1609.00266  [pdf, other

    cs.CR

    Retrofitting Applications with Provenance-Based Security Monitoring

    Authors: Adam Bates, Kevin Butler, Alin Dobra, Brad Reaves, Patrick Cable, Thomas Moyer, Nabil Schear

    Abstract: Data provenance is a valuable tool for detecting and preventing cyber attack, providing insight into the nature of suspicious events. For example, an administrator can use provenance to identify the perpetrator of a data leak, track an attacker's actions following an intrusion, or even control the flow of outbound data within an organization. Unfortunately, providing relevant data provenance for c… ▽ More

    Submitted 1 September, 2016; originally announced September 2016.