Skip to main content

Showing 1–8 of 8 results for author: Doupé, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.02624  [pdf, other

    cs.CR cs.SE

    Take a Step Further: Understanding Page Spray in Linux Kernel Exploitation

    Authors: Ziyi Guo, Dang K Le, Zhenpeng Lin, Kyle Zeng, Ruoyu Wang, Tiffany Bao, Yan Shoshitaishvili, Adam Doupé, Xinyu Xing

    Abstract: Recently, a novel method known as Page Spray emerges, focusing on page-level exploitation for kernel vulnerabilities. Despite the advantages it offers in terms of exploitability, stability, and compatibility, comprehensive research on Page Spray remains scarce. Questions regarding its root causes, exploitation model, comparative benefits over other exploitation techniques, and possible mitigation… ▽ More

    Submitted 6 June, 2024; v1 submitted 3 June, 2024; originally announced June 2024.

  2. arXiv:2210.15011  [pdf, other

    cs.GT cs.CR

    Using Deception in Markov Game to Understand Adversarial Behaviors through a Capture-The-Flag Environment

    Authors: Siddhant Bhambri, Purv Chauhan, Frederico Araujo, Adam Doupé, Subbarao Kambhampati

    Abstract: Identifying the actual adversarial threat against a system vulnerability has been a long-standing challenge for cybersecurity research. To determine an optimal strategy for the defender, game-theoretic based decision models have been widely used to simulate the real-world attacker-defender scenarios while taking the defender's constraints into consideration. In this work, we focus on understanding… ▽ More

    Submitted 9 November, 2022; v1 submitted 26 October, 2022; originally announced October 2022.

    Comments: Accepted at GameSec 2022

  3. arXiv:2204.08592  [pdf

    cs.CR

    Context-Auditor: Context-sensitive Content Injection Mitigation

    Authors: Faezeh Kalantari, Mehrnoosh Zaeifi, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé

    Abstract: Cross-site scripting (XSS) is the most common vulnerability class in web applications over the last decade. Much research attention has focused on building exploit mitigation defenses for this problem, but no technique provides adequate protection in the face of advanced attacks. One technique that bypasses XSS mitigations is the scriptless attack: a content injection technique that uses (among ot… ▽ More

    Submitted 28 April, 2022; v1 submitted 18 April, 2022; originally announced April 2022.

  4. arXiv:2202.12336  [pdf, other

    cs.CR cs.SE

    Automatically Mitigating Vulnerabilities in Binary Programs via Partially Recompilable Decompilation

    Authors: Pemma Reiter, Hui Jun Tay, Westley Weimer, Adam Doupé, Ruoyu Wang, Stephanie Forrest

    Abstract: Vulnerabilities are challenging to locate and repair, especially when source code is unavailable and binary patching is required. Manual methods are time-consuming, require significant expertise, and do not scale to the rate at which new vulnerabilities are discovered. Automated methods are an attractive alternative, and we propose Partially Recompilable Decompilation (PRD). PRD lifts suspect bina… ▽ More

    Submitted 12 June, 2023; v1 submitted 24 February, 2022; originally announced February 2022.

  5. arXiv:2107.10344  [pdf

    cs.CY q-bio.PE

    Challenges in cybersecurity: Lessons from biological defense systems

    Authors: Edward Schrom, Ann Kinzig, Stephanie Forrest, Andrea L. Graham, Simon A. Levin, Carl T. Bergstrom, Carlos Castillo-Chavez, James P. Collins, Rob J. de Boer, Adam Doupé, Roya Ensafi, Stuart Feldman, Bryan T. Grenfell. Alex Halderman, Silvie Huijben, Carlo Maley, Melanie Mosesr, Alan S. Perelson, Charles Perrings, Joshua Plotkin, Jennifer Rexford, Mohit Tiwari

    Abstract: We explore the commonalities between methods for assuring the security of computer systems (cybersecurity) and the mechanisms that have evolved through natural selection to protect vertebrates against pathogens, and how insights derived from studying the evolution of natural defenses can inform the design of more effective cybersecurity systems. More generally, security challenges are crucial for… ▽ More

    Submitted 21 July, 2021; originally announced July 2021.

    Comments: 20 pages

    MSC Class: A.0

  6. arXiv:2103.12843  [pdf, other

    cs.CR

    Scam Pandemic: How Attackers Exploit Public Fear through Phishing

    Authors: Marzieh Bitaab, Haehyun Cho, Adam Oest, Penghui Zhang, Zhibo Sun, Rana Pourmohamad, Doowon Kim, Tiffany Bao, Ruoyu Wang, Yan Shoshitaishvili, Adam Doupé, Gail-Joon Ahn

    Abstract: As the COVID-19 pandemic started triggering widespread lockdowns across the globe, cybercriminals did not hesitate to take advantage of users' increased usage of the Internet and their reliance on it. In this paper, we carry out a comprehensive measurement study of online social engineering attacks in the early months of the pandemic. By collecting, synthesizing, and analyzing DNS records, TLS cer… ▽ More

    Submitted 23 March, 2021; originally announced March 2021.

    Comments: 10 pages, Accepted to eCrime 2020

  7. You shall not pass: Mitigating SQL Injection Attacks on Legacy Web Applications

    Authors: Rasoul Jahanshahi, Adam Doupé, Manuel Egele

    Abstract: SQL injection (SQLi) attacks pose a significant threat to the security of web applications. Existing approaches do not support object-oriented programming that renders these approaches unable to protect the real-world web apps such as Wordpress, Joomla, or Drupal against SQLi attacks. We propose a novel hybrid static-dynamic analysis for PHP web applications that limits each PHP function for acces… ▽ More

    Submitted 11 July, 2020; v1 submitted 22 June, 2020; originally announced June 2020.

    Comments: Accepted in ASIACCS 2020

  8. arXiv:1602.07024  [pdf, other

    cs.CR cs.AI cs.GT cs.MA

    Moving Target Defense for Web Applications using Bayesian Stackelberg Games

    Authors: Sailik Sengupta, Satya Gautam Vadlamudi, Subbarao Kambhampati, Marthony Taguinod, Adam Doupé, Ziming Zhao, Gail-Joon Ahn

    Abstract: The present complexity in designing web applications makes software security a difficult goal to achieve. An attacker can explore a deployed service on the web and attack at his/her own leisure. Moving Target Defense (MTD) in web applications is an effective mechanism to nullify this advantage of their reconnaissance but the framework demands a good switching strategy when switching between multip… ▽ More

    Submitted 16 November, 2016; v1 submitted 22 February, 2016; originally announced February 2016.

    Comments: 9 pages, 4 figures