Skip to content

Commit 313c6b4

Browse files
authored
Merge pull request #111 from emmanuel-ferdman/master
Fix fuzzing papers
2 parents e0b5ca1 + f0b0d9d commit 313c6b4

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

README.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -3395,7 +3395,7 @@ To overcome the problems, we design and implement ETHPLOIT, a smart contract exp
33953395

33963396
* <img src="image/pdf_24px.png">[Paper](https://cybersecurity.springeropen.com/track/pdf/10.1186/s42400-019-0028-9)
33973397

3398-
* <img src="image/ppt_24px.png">[Slides](./Paper/CCS18_Revery_Slides)
3398+
* <img src="image/ppt_24px.png">[Slides](./Paper/CCS18_Revery_Slides.pdf)
33993399

34003400
* <img src="image/youtube.png">[Video](https://www.youtube.com/watch?v=QsG_nTBSN4c)
34013401

@@ -3410,7 +3410,7 @@ We have developed a prototype system and evaluated it on a set of 19 CTF (captur
34103410

34113411
* <img src="image/pdf_24px.png">[Paper](./Paper/CCS18_Revery.pdf)
34123412

3413-
* <img src="image/ppt_24px.png">[Slides](./Paper/CCS18_Revery_Slides)
3413+
* <img src="image/ppt_24px.png">[Slides](./Paper/CCS18_Revery_Slides.pdf)
34143414

34153415
* <img src="image/youtube.png">[Video](https://www.youtube.com/watch?v=QsG_nTBSN4c)
34163416

@@ -4690,7 +4690,7 @@ We evaluate QFuzz on a large set of benchmarks from existing work and real-world
46904690

46914691
### ct-fuzz: Fuzzing for Timing Leaks (ICST 2020)
46924692

4693-
* <img src="image/pdf_24px.png">[Paper](./Paper/ICST20_ct-fuzZ.pdf)
4693+
* <img src="image/pdf_24px.png">[Paper](./Paper/ICST20_ct-fuzz.pdf)
46944694

46954695
**Abstract:** Testing-based methodologies like fuzzing are able to analyze complex software which is not amenable to traditional formal approaches like verification, model checking, and abstract interpretation. Despite enormous success at exposing countless security vulnerabilities in many popular software projects, applications of testing-based approaches have mainly targeted checking traditional safety properties like memory safety. While unquestionably important, this class of properties does not precisely characterize other important security aspects such as information leakage, e.g., through side channels. In this work we extend testing-based software analysis methodologies to two-safety properties, which enables the precise discovery of information leaks in complex software. In particular, we present the ct-fuzz tool, which lends coverage-guided greybox fuzzers the ability to detect two-safety property violations. Our approach is capable of exposing violations to any two-safety property expressed as equality between two program traces. Empirically, we demonstrate that ct-fuzz swiftly reveals timing leaks in popular cryptographic implementations.
46964696

@@ -4914,7 +4914,7 @@ We present experimental results showing that these two techniques are necessary
49144914

49154915
### Fuzzing JavaScript Environment APIs with Interdependent Function Calls (IFM 2019)
49164916

4917-
* <img src="image/pdf_24px.png">[Paper]([./Paper/ICSE19_RESTler.pdf](https://link.springer.com/chapter/10.1007/978-3-030-34968-4_12))
4917+
* <img src="image/pdf_24px.png">[Paper](https://link.springer.com/chapter/10.1007/978-3-030-34968-4_12)
49184918

49194919
**Abstract:** The prevalence of the JavaScript programming language makes the correctness and security of its execution environments highly important. The most exposed and vulnerable parts of these environments are the APIs published to the executed untrusted JavaScript programs. This paper revisits the fuzzing technique that generates JavaScript environment API calls using random walks on so-called prototype graphs to uncover potentially security-related failures. We show the limits of generating independent call expressions, the approach of prior work, and give an extension to enable the generation of interdependent API calls that re-use each other's results. We demonstrate with an experiment that this enhancement allows our approach to exercise JavaScript environment APIs in ways that were not possible with the previous approach, and that it can also trigger more issues in a real target.
49204920

0 commit comments

Comments
 (0)