Whitebox fuzzing is a novel form of security testing based on runtime symbolic execution and constraint solving. Over the last couple of years, whitebox fuzzers have found dozens of new security vulnerabilities (buffer overflows) in Windows and Linux applications, including codecs, image viewers and media players. Those types of applications tend to use floating-point instructions available on modern processors, yet existing whitebox fuzzers and SMT constraint solvers do not handle floating-point arithmetic. Are there new security vulnerabilities lurking in floating-point code? A naive solution would be to extend symbolic execu-tion to floating-point (FP) instructions (months of work), ex-tend SMT solvers to reason about FP constraints (mon...
Memory corruption attacks, such as buffer overflow attacks, have been threat-ening software security...
Memory safety vulnerabilities remain one of the most critical sources of exploitable security proble...
Memory corruption attacks, such as buffer overflow attacks, have been threatening software security ...
Whitebox fuzzing is a novel form of security testing based on runtime symbolic execution and constra...
Concepts and technologies are described herein for determining memory safety of floating-point compu...
Abstract. We report in this paper how we proved memory safety of a complex Windows image parser writ...
Abstract—We identify a timing channel in the floating point instructions of modern x86 processors: t...
Dynamic test generation consists of executing a program while gathering symbolic constraints on inpu...
We propose preventing format-string attacks with a combination of static dataflow analysis and dynam...
Binary code analysis is widely used in many applications, including reverse engineering, software fo...
This research investigates the complexity of, and develops a formal approach for, vulnerability disc...
Fuzz testing has proven successful in finding security vulnerabilities in large programs. However, t...
We show that abstract interpretation-based static program analysis can be made efficient and precise...
Static program analysis computes information about a program without executing the program. This can...
Our computers, phones, and other smart devices are running a vast and ever increasing amount of soft...
Memory corruption attacks, such as buffer overflow attacks, have been threat-ening software security...
Memory safety vulnerabilities remain one of the most critical sources of exploitable security proble...
Memory corruption attacks, such as buffer overflow attacks, have been threatening software security ...
Whitebox fuzzing is a novel form of security testing based on runtime symbolic execution and constra...
Concepts and technologies are described herein for determining memory safety of floating-point compu...
Abstract. We report in this paper how we proved memory safety of a complex Windows image parser writ...
Abstract—We identify a timing channel in the floating point instructions of modern x86 processors: t...
Dynamic test generation consists of executing a program while gathering symbolic constraints on inpu...
We propose preventing format-string attacks with a combination of static dataflow analysis and dynam...
Binary code analysis is widely used in many applications, including reverse engineering, software fo...
This research investigates the complexity of, and develops a formal approach for, vulnerability disc...
Fuzz testing has proven successful in finding security vulnerabilities in large programs. However, t...
We show that abstract interpretation-based static program analysis can be made efficient and precise...
Static program analysis computes information about a program without executing the program. This can...
Our computers, phones, and other smart devices are running a vast and ever increasing amount of soft...
Memory corruption attacks, such as buffer overflow attacks, have been threat-ening software security...
Memory safety vulnerabilities remain one of the most critical sources of exploitable security proble...
Memory corruption attacks, such as buffer overflow attacks, have been threatening software security ...