[go: up one dir, main page]

Li et al., 2020 - Google Patents

V-fuzz: Vulnerability prediction-assisted evolutionary fuzzing for binary programs

Li et al., 2020

Document ID
15920877882310056808
Author
Li Y
Ji S
Lyu C
Chen Y
Chen J
Gu Q
Wu C
Beyah R
Publication year
Publication venue
IEEE transactions on cybernetics

External Links

Snippet

Fuzzing is a technique of finding bugs by executing a target program recurrently with a large number of abnormal inputs. Most of the coverage-based fuzzers consider all parts of a program equally and pay too much attention to how to improve the code coverage. It is …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • G06F21/563Static detection by source code analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/30Arrangements for executing machine-instructions, e.g. instruction decode
    • G06F9/32Address formation of the next instruction, e.g. incrementing the instruction counter, jump
    • G06F9/322Address formation of the next instruction, e.g. incrementing the instruction counter, jump for non-sequential address
    • G06F9/328Address formation of the next instruction, e.g. incrementing the instruction counter, jump for non-sequential address for runtime instruction patching
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/30Arrangements for executing machine-instructions, e.g. instruction decode
    • G06F9/38Concurrent instruction execution, e.g. pipeline, look ahead
    • G06F9/3836Instruction issuing, e.g. dynamic instruction scheduling, out of order instruction execution
    • G06F9/3842Speculative instruction execution
    • G06F9/3844Speculative instruction execution using dynamic prediction, e.g. branch history table
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/44Arrangements for executing specific programmes
    • G06F9/455Emulation; Software simulation, i.e. virtualisation or emulation of application or operating system execution engines
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Error detection; Error correction; Monitoring responding to the occurence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/0793Remedial or corrective actions
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/30Arrangements for executing machine-instructions, e.g. instruction decode
    • G06F9/30003Arrangements for executing specific machine instructions
    • G06F9/3005Arrangements for executing specific machine instructions to perform operations for flow control
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/28Error detection; Error correction; Monitoring by checking the correct order of processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run

Similar Documents

Publication Publication Date Title
Li et al. V-fuzz: Vulnerability prediction-assisted evolutionary fuzzing for binary programs
Chakraborty et al. Deep learning based vulnerability detection: Are we there yet?
Zeng et al. Software vulnerability analysis and discovery using deep learning techniques: A survey
He et al. Learning to fuzz from symbolic execution with application to smart contracts
Pham et al. CRADLE: cross-backend validation to detect and localize bugs in deep learning libraries
Li et al. V-fuzz: Vulnerability-oriented evolutionary fuzzing
Li et al. Fast t2t: Optimization consistency speeds up diffusion-based training-to-testing solving for combinatorial optimization
Guo et al. Coverage guided differential adversarial testing of deep learning systems
Gan et al. Ptolemy: Architecture support for robust deep learning
Huang et al. Decision mamba: Reinforcement learning via hybrid selective sequence modeling
Zhao et al. Suzzer: A vulnerability-guided fuzzer based on deep learning
Dahl et al. Stack-based buffer overflow detection using recurrent neural networks
Zekany et al. CrystalBall: Statically analyzing runtime behavior via deep sequence learning
Zhao et al. Input‐Output Example‐Guided Data Deobfuscation on Binary
Lin et al. Towards interpreting ML-based automated malware detection models: A survey
Sawadogo et al. DeepMalOb: deep detection of obfuscated android malware
Hu et al. A systematic view of model leakage risks in deep neural network systems
Qin et al. Syneva: Evaluating ml programs by mirror program synthesis
Alrabaee et al. CPA: Accurate cross-platform binary authorship characterization using LDA
Shindo et al. Deisam: Segment anything with deictic prompting
Yadin et al. Classification diffusion models: Revitalizing density ratio estimation
Wang et al. Graph neural networks enhanced smart contract vulnerability detection of educational blockchain
Jiang et al. Enhancing fine-grained vulnerability detection with reinforcement learning
Parisi et al. Making the most of scarce input data in deep learning-based source code classification for heterogeneous device mapping
Ali et al. MLFuzzer: a fuzzing approach based on generative adversarial networks and BiLSTM for detecting vulnerabilities in smart contracts