Skip to main content

Showing 1–10 of 10 results for author: Sani, A A

.
  1. arXiv:2401.11642  [pdf, other

    cs.SE cs.CR cs.OS

    SyzRetrospector: A Large-Scale Retrospective Study of Syzbot

    Authors: Joseph Bursey, Ardalan Amiri Sani, Zhiyun Qian

    Abstract: Over the past 6 years, Syzbot has fuzzed the Linux kernel day and night to report over 5570 bugs, of which 4604 have been patched [11]. While this is impressive, we have found the average time to find a bug is over 405 days. Moreover, we have found that current metrics commonly used, such as time-to-find and number of bugs found, are inaccurate in evaluating Syzbot since bugs often spend the major… ▽ More

    Submitted 21 January, 2024; originally announced January 2024.

  2. arXiv:2305.08782  [pdf, other

    cs.CR cs.SE

    BRF: eBPF Runtime Fuzzer

    Authors: Hsin-Wei Hung, Ardalan Amiri Sani

    Abstract: The eBPF technology in the Linux kernel has been widely adopted for different applications, such as networking, tracing, and security, thanks to the programmability it provides. By allowing user-supplied eBPF programs to be executed directly in the kernel, it greatly increases the flexibility and efficiency of deploying customized logic. However, eBPF also introduces a new and wide attack surface:… ▽ More

    Submitted 15 May, 2023; originally announced May 2023.

  3. arXiv:2203.08284  [pdf, other

    cs.CR cs.AR cs.OS

    Minimizing Trust with Exclusively-Used Physically-Isolated Hardware

    Authors: Zhihao Yao, Seyed Mohammadjavad Seyed Talebi, Mingyi Chen, Ardalan Amiri Sani, Thomas Anderson

    Abstract: Smartphone owners often need to run security-critical programs on the same device as other untrusted and potentially malicious programs. This requires users to trust hardware and system software to correctly sandbox malicious programs, trust that is often misplaced. Our goal is to minimize the number and complexity of hardware and software components that a smartphone owner needs to trust to wit… ▽ More

    Submitted 20 October, 2022; v1 submitted 15 March, 2022; originally announced March 2022.

  4. arXiv:2109.12712  [pdf, other

    cs.CR

    Vronicle: A System for Producing Videos with Verifiable Provenance

    Authors: Yuxin, Liu, Yoshimichi Nakatsuka, Ardalan Amiri Sani, Sharad Agarwal, Gene Tsudik

    Abstract: Demonstrating the veracity of videos is a longstanding problem that has recently become more urgent and acute. It is extremely hard to accurately detect manipulated videos using content analysis, especially in the face of subtle, yet effective, manipulations, such as frame rate changes or skin tone adjustments. One prominent alternative to content analysis is to securely embed provenance informati… ▽ More

    Submitted 26 September, 2021; originally announced September 2021.

  5. arXiv:2108.02293  [pdf, other

    cs.CR cs.DB cs.DC cs.NI

    IoT Notary: Attestable Sensor Data Capture in IoT Environments

    Authors: Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian, Mamadou H. Diallo, Ardalan Amiri Sani

    Abstract: Contemporary IoT environments, such as smart buildings, require end-users to trust data-capturing rules published by the systems. There are several reasons why such a trust is misplaced -- IoT systems may violate the rules deliberately or IoT devices may transfer user data to a malicious third-party due to cyberattacks, leading to the loss of individuals' privacy or service integrity. To address s… ▽ More

    Submitted 4 August, 2021; originally announced August 2021.

    Comments: This version has been accepted in ACM Transactions on Internet Technology (TOIT), 2021. arXiv admin note: substantial text overlap with arXiv:1908.10033

  6. arXiv:1908.10033  [pdf, other

    cs.CR cs.DB cs.DC cs.IR

    IoT Notary: Sensor Data Attestation in Smart Environment

    Authors: Nisha Panwar, Shantanu Sharma, Guoxi Wang, Sharad Mehrotra, Nalini Venkatasubramanian, Mamadou H. Diallo, Ardalan Amiri Sani

    Abstract: Contemporary IoT environments, such as smart buildings, require end-users to trust data-capturing rules published by the systems. There are several reasons why such a trust is misplaced --- IoT systems may violate the rules deliberately or IoT devices may transfer user data to a malicious third-party due to cyberattacks, leading to the loss of individuals' privacy or service integrity. To address… ▽ More

    Submitted 27 August, 2019; originally announced August 2019.

    Comments: Accepted in IEEE International Symposium on Network Computing and Applications (NCA), 2019

  7. arXiv:1411.3777  [pdf, other

    cs.OS

    Glider: A GPU Library Driver for Improved System Security

    Authors: Ardalan Amiri Sani, Lin Zhong, Dan S. Wallach

    Abstract: Legacy device drivers implement both device resource management and isolation. This results in a large code base with a wide high-level interface making the driver vulnerable to security attacks. This is particularly problematic for increasingly popular accelerators like GPUs that have large, complex drivers. We solve this problem with library drivers, a new driver architecture. A library driver i… ▽ More

    Submitted 13 November, 2014; originally announced November 2014.

  8. arXiv:1312.4931  [pdf, other

    cs.OS

    Rio: A System Solution for Sharing I/O between Mobile Systems

    Authors: Ardalan Amiri Sani, Kevin Boos, Min Hong Yun, Lin Zhong

    Abstract: Mobile systems are equipped with a diverse collection of I/O devices, including cameras, microphones, sensors, and modems. There exist many novel use cases for allowing an application on one mobile system to utilize I/O devices from another. This paper presents Rio, an I/O sharing solution that supports unmodified applications and exposes all the functionality of an I/O device for sharing. Rio's d… ▽ More

    Submitted 17 December, 2013; originally announced December 2013.

    Report number: Rice University ECE Technical Report 2013-12-17

  9. arXiv:1304.3771  [pdf, other

    cs.OS

    Making I/O Virtualization Easy with Device Files

    Authors: Ardalan Amiri Sani, Sreekumar Nair, Lin Zhong, Quinn Jacobson

    Abstract: Personal computers have diverse and fast-evolving I/O devices, making their I/O virtualization different from that of servers and data centers. In this paper, we present our recent endeavors in simplifying I/O virtualization for personal computers. Our key insight is that many operating systems, including Unix-like ones, abstract I/O devices as device files. There is a small and stable set of oper… ▽ More

    Submitted 13 April, 2013; originally announced April 2013.

    Report number: Rice University ECE Technical Report 2013-04-13

  10. arXiv:1106.5568  [pdf

    cs.IR cs.DB

    Opportunistic Content Search of Smartphone Photos

    Authors: Ardalan Amiri Sani, Wolfgang Richter, Xuan Bao, Trevor Narayan, Mahadev Satyanarayanan, Lin Zhong, Romit Roy Choudhury

    Abstract: Photos taken by smartphone users can accidentally contain content that is timely and valuable to others, often in real-time. We report the system design and evaluation of a distributed search system, Theia, for crowd-sourced real-time content search of smartphone photos. Because smartphones are resource-constrained, Theia incorporates two key innovations to control search cost and improve search e… ▽ More

    Submitted 28 June, 2011; originally announced June 2011.

    Report number: Technical Report TR0627-2011, Rice University