Skip to main content

Showing 1–3 of 3 results for author: Aafer, Y

Searching in archive cs. Search in all archives.
.
  1. arXiv:2401.01269  [pdf, other

    cs.CR cs.AI cs.SE

    LLbezpeky: Leveraging Large Language Models for Vulnerability Detection

    Authors: Noble Saji Mathews, Yelizaveta Brus, Yousra Aafer, Meiyappan Nagappan, Shane McIntosh

    Abstract: Despite the continued research and progress in building secure systems, Android applications continue to be ridden with vulnerabilities, necessitating effective detection methods. Current strategies involving static and dynamic analysis tools come with limitations like overwhelming number of false positives and limited scope of analysis which make either difficult to adopt. Over the past years, ma… ▽ More

    Submitted 13 February, 2024; v1 submitted 2 January, 2024; originally announced January 2024.

    Comments: This project report was presented as a part of the course CS858 at the University of Waterloo under the supervision of Prof. Yousra Aafer

  2. arXiv:2305.10233  [pdf, other

    cs.SE

    Statically Detecting Buffer Overflow in Cross-language Android Applications Written in Java and C/C++

    Authors: Kishanthan Thangarajah, Noble Mathews, Michael Pu, Meiyappan Nagappan, Yousra Aafer, Sridhar Chimalakonda

    Abstract: Many applications are being written in more than one language to take advantage of the features that different languages provide such as native code support, improved performance, and language-specific libraries. However, there are few static analysis tools currently available to analyse the source code of such multilingual applications. Existing work on cross-language (Java and C/C++) analysis fa… ▽ More

    Submitted 17 May, 2023; v1 submitted 17 May, 2023; originally announced May 2023.

  3. arXiv:1410.7752  [pdf

    cs.CR

    A Systematic Security Evaluation of Android's Multi-User Framework

    Authors: Paul Ratazzi, Yousra Aafer, Amit Ahlawat, Hao Hao, Yifei Wang, Wenliang Du

    Abstract: Like many desktop operating systems in the 1990s, Android is now in the process of including support for multi-user scenarios. Because these scenarios introduce new threats to the system, we should have an understanding of how well the system design addresses them. Since the security implications of multi-user support are truly pervasive, we developed a systematic approach to studying the system a… ▽ More

    Submitted 28 October, 2014; originally announced October 2014.

    Comments: In Proceedings of the Third Workshop on Mobile Security Technologies (MoST) 2014 (http://arxiv.longhoe.net/abs/1410.6674)

    Report number: MoST/2014/09