Filters








9 Hits in 4.5 sec

CAB-Fuzz: Practical Concolic Testing Techniques for COTS Operating Systems

Su Yong Kim, Sangho Lee, Insu Yun, Wen Xu, Byoungyoung Lee, Youngtae Yun, Taesoo Kim
2017 USENIX Annual Technical Conference  
disclosure vulnerability in a cryptography driver (CVE-2016-7219).  ...  Discovering the security vulnerabilities of commercial off-the-shelf (COTS) operating systems (OSes) is challenging because they not only are huge and complex, but also lack detailed debug information.  ...  Kernel and Device Driver Testing. CAB-FUZZ is designed to test COTS OSes and device drivers. To the best of our knowledge, only a few studies apply concolic execution to OSes and device drivers.  ... 
dblp:conf/usenix/KimLYXLYK17 fatcat:dm3o7kkcdnao7i7i32kg274q4u

HyperDbg: Reinventing Hardware-Assisted Debugging [article]

Mohammad Sina Karvandi, MohammadHossein Gholamrezaei, Saleh Khalaj Monfared, Suorush Medi, Behrooz Abbassi, Ali Amini, Reza Mortazavi, Saeid Gorgin, Dara Rahmati, Michael Schwarz
2022 arXiv   pre-print
Our experiment on three concrete debugging scenarios shows that compared to WinDbg as the only kernel debugger, HyperDbg performs step-in, conditional breaks, and syscall recording, 2.98x, 1319x, and 2018x  ...  Our results of the dynamic analysis of 10,853 malware samples show that HyperDbg's stealthiness allows debugging on average 22% and 26% more samples than WinDbg and x64dbg, respectively.  ...  Fuzzing One of the main problems of kernel fuzzing is the fact that every invalid value causes a kernel error and thus a BSOD.  ... 
arXiv:2207.05676v1 fatcat:2u2ufrmfmveg7dscvf7q3zvjae

S2E

Vitaly Chipounov, Volodymyr Kuznetsov, George Candea
2011 Proceedings of the sixteenth international conference on Architectural support for programming languages and operating systems - ASPLOS '11  
stack-user programs, libraries, kernel, drivers, etc.  ...  -instead of using abstract models of these layers; and to operate directly on binaries, thus being able to analyze even proprietary software.  ...  Reverse Engineering of Closed-Source Drivers We also built REV + , a tool for reverse engineering binary Windows device drivers; it is a reimplementation of RevNIC [13] .  ... 
doi:10.1145/1950365.1950396 dblp:conf/asplos/ChipounovKC11 fatcat:ju6j3mbbmvafdinmg463beuppu

S2E

Vitaly Chipounov, Volodymyr Kuznetsov, George Candea
2012 SIGPLAN notices  
stack-user programs, libraries, kernel, drivers, etc.  ...  -instead of using abstract models of these layers; and to operate directly on binaries, thus being able to analyze even proprietary software.  ...  Reverse Engineering of Closed-Source Drivers We also built REV + , a tool for reverse engineering binary Windows device drivers; it is a reimplementation of RevNIC [13] .  ... 
doi:10.1145/2248487.1950396 fatcat:zzwq5gdo7rgftcelppt3hqsmcq

S2E

Vitaly Chipounov, Volodymyr Kuznetsov, George Candea
2011 SIGPLAN notices  
stack-user programs, libraries, kernel, drivers, etc.  ...  -instead of using abstract models of these layers; and to operate directly on binaries, thus being able to analyze even proprietary software.  ...  Reverse Engineering of Closed-Source Drivers We also built REV + , a tool for reverse engineering binary Windows device drivers; it is a reimplementation of RevNIC [13] .  ... 
doi:10.1145/1961296.1950396 fatcat:2vciqscsnjhu3feu4rjiqfie7u

S2E

Vitaly Chipounov, Volodymyr Kuznetsov, George Candea
2011 SIGARCH Computer Architecture News  
stack-user programs, libraries, kernel, drivers, etc.  ...  -instead of using abstract models of these layers; and to operate directly on binaries, thus being able to analyze even proprietary software.  ...  Reverse Engineering of Closed-Source Drivers We also built REV + , a tool for reverse engineering binary Windows device drivers; it is a reimplementation of RevNIC [13] .  ... 
doi:10.1145/1961295.1950396 fatcat:6ll5gkal35asfcgdyaf5dw7btu

The S2E Platform

Vitaly Chipounov, Volodymyr Kuznetsov, George Candea
2012 ACM Transactions on Computer Systems  
of proprietary software, and automated testing of kernel-mode and user-mode binaries.  ...  stack-user programs, libraries, kernel, drivers, etc.  ...  device driver.  ... 
doi:10.1145/2110356.2110358 fatcat:zclxohdqb5co5eqxffc3ovve2u

Improving systems software security through program analysis and instrumentation

Volodymyr Kuznetsov
2016
We applied DDT to several closed-source Microsoft-certified Windows device drivers and discovered 14 serious new bugs that can cause crashes or compromise security of the entire system.  ...  Second, we present DDT, a tool for testing closed-source device drivers to automatically find bugs like memory errors or race conditions.  ...  At the same time, the semantics of C++ restricts potential targets of virtual function calls stricter than other indirect control flow transfers, so merely enforcing this semantics provides a strong form  ... 
doi:10.5075/epfl-thesis-7055 fatcat:peibne2yy5dyzjigk6a2ructli

Metamorphic Testing for Software Libraries and Graphics Compilers

Andrei Lascu, Alastair Donaldson, EPSRC
2022
We apply methods from the domains of metamorphic testing and fuzzing to produce complex test cases.  ...  Additionally, we investigate the combined use of MF++ and MF++R in order to augment code coverage of library test suites.  ...  I would like to thank the research group at Imperial, who kept my sanity in check to not succumb to the pitfalls of the dark corners of the PhD.  ... 
doi:10.25560/96979 fatcat:vxyhh6tipvcoxdvcpyexi6u4ku