Skip to main content

Showing 1–8 of 8 results for author: Egele, M

.
  1. arXiv:2209.01789  [pdf, other

    cs.AR cs.CR

    ProcessorFuzz: Guiding Processor Fuzzing using Control and Status Registers

    Authors: Sadullah Canakci, Chathura Rajapaksha, Anoop Mysore Nataraja, Leila Delshadtehrani, Michael Taylor, Manuel Egele, Ajay Joshi

    Abstract: As the complexity of modern processors has increased over the years, develo** effective verification strategies to identify bugs prior to manufacturing has become critical. Undiscovered micro-architectural bugs in processors can manifest as severe security vulnerabilities in the form of side channels, functional bugs, etc. Inspired by software fuzzing, a technique commonly used for software test… ▽ More

    Submitted 5 September, 2022; originally announced September 2022.

  2. arXiv:2201.08461  [pdf, ps, other

    cs.CR cs.SE

    Polytope: Practical Memory Access Control for C++ Applications

    Authors: Ioannis Agadakos, Manuel Egele, William Robertson

    Abstract: Designing and implementing secure software is inarguably more important than ever. However, despite years of research into privilege separating programs, it remains difficult to actually do so and such efforts can take years of labor-intensive engineering to reach fruition. At the same time, new intra-process isolation primitives make strong data isolation and privilege separation more attractive… ▽ More

    Submitted 24 January, 2022; v1 submitted 20 January, 2022; originally announced January 2022.

    MSC Class: 68M25 ACM Class: D.2.3; D.2.11; D.4.6

  3. arXiv:2012.02715  [pdf, other

    cs.CR cs.AR

    Efficient Sealable Protection Keys for RISC-V

    Authors: Leila Delshadtehrani, Sadullah Canakci, Manuel Egele, Ajay Joshi

    Abstract: With the continuous increase in the number of software-based attacks, there has been a growing effort towards isolating sensitive data and trusted software components from untrusted third-party components. A hardware-assisted intra-process isolation mechanism enables software developers to partition a process into isolated components and in turn secure sensitive data from untrusted components. How… ▽ More

    Submitted 4 December, 2020; originally announced December 2020.

    Comments: 7 pages, 5 figures

  4. You shall not pass: Mitigating SQL Injection Attacks on Legacy Web Applications

    Authors: Rasoul Jahanshahi, Adam Doupé, Manuel Egele

    Abstract: SQL injection (SQLi) attacks pose a significant threat to the security of web applications. Existing approaches do not support object-oriented programming that renders these approaches unable to protect the real-world web apps such as Wordpress, Joomla, or Drupal against SQLi attacks. We propose a novel hybrid static-dynamic analysis for PHP web applications that limits each PHP function for acces… ▽ More

    Submitted 11 July, 2020; v1 submitted 22 June, 2020; originally announced June 2020.

    Comments: Accepted in ASIACCS 2020

  5. HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing

    Authors: William Blair, Andrea Mambretti, Sajjad Arshad, Michael Weissbacher, William Robertson, Engin Kirda, Manuel Egele

    Abstract: Contemporary fuzz testing techniques focus on identifying memory corruption vulnerabilities that allow adversaries to achieve either remote code execution or information disclosure. Meanwhile, Algorithmic Complexity (AC)vulnerabilities, which are a common attack vector for denial-of-service attacks, remain an understudied threat. In this paper, we present HotFuzz, a framework for automatically dis… ▽ More

    Submitted 14 February, 2020; v1 submitted 9 February, 2020; originally announced February 2020.

    Comments: Network and Distributed Systems Security (NDSS) Symposium, San Diego, CA, USA, February 2020

  6. arXiv:1812.00140  [pdf, ps, other

    cs.CR cs.SE

    The Art, Science, and Engineering of Fuzzing: A Survey

    Authors: Valentin J. M. Manes, HyungSeok Han, Choongwoo Han, Sang Kil Cha, Manuel Egele, Edward J. Schwartz, Maverick Woo

    Abstract: Among the many software vulnerability discovery techniques available today, fuzzing has remained highly popular due to its conceptual simplicity, its low barrier to deployment, and its vast amount of empirical evidence in discovering real-world software vulnerabilities. At a high level, fuzzing refers to a process of repeatedly running a program with generated inputs that may be syntactically or s… ▽ More

    Submitted 7 April, 2019; v1 submitted 30 November, 2018; originally announced December 2018.

    Comments: 29 pages, under submission to ACM Computing Surveys (July 2018) - 2018.12.10 update: correct minor mistakes in overview table - 2019.02.16 update: source clean - 2019.04.08: submission to TSE, 21 pages

  7. arXiv:1702.04256  [pdf, other

    cs.SI

    What's in a Name? Understanding Profile Name Reuse on Twitter

    Authors: Enrico Mariconti, Jeremiah Onaolapo, Syed Sharique Ahmad, Nicolas Nikiforou, Manuel Egele, Nick Nikiforakis, Gianluca Stringhini

    Abstract: Users on Twitter are commonly identified by their profile names. These names are used when directly addressing users on Twitter, are part of their profile page URLs, and can become a trademark for popular accounts, with people referring to celebrities by their real name and their profile name, interchangeably. Twitter, however, has chosen to not permanently link profile names to their correspondin… ▽ More

    Submitted 14 February, 2017; originally announced February 2017.

    Comments: International World Wide Web Conference 2017

  8. arXiv:1509.03531  [pdf, ps, other

    cs.CR cs.SI

    Towards Detecting Compromised Accounts on Social Networks

    Authors: Manuel Egele, Gianluca Stringhini, Christopher Kruegel, Giovanni Vigna

    Abstract: Compromising social network accounts has become a profitable course of action for cybercriminals. By hijacking control of a popular media or business account, attackers can distribute their malicious messages or disseminate fake information to a large user base. The impacts of these incidents range from a tarnished reputation to multi-billion dollar monetary losses on financial markets. In our pre… ▽ More

    Submitted 11 September, 2015; originally announced September 2015.

    Journal ref: TDSC-2014-10-0271.R1