Skip to main content

Showing 1–4 of 4 results for author: Hiser, J D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2312.00714  [pdf, ps, other

    cs.CR

    Zipr: A High-Impact, Robust, Open-source, Multi-platform, Static Binary Rewriter

    Authors: Jason D. Hiser, Anh Nguyen-Tuong, Jack W. Davidson

    Abstract: Zipr is a tool for static binary rewriting, first published in 2016. Zipr was engineered to support arbitrary program modification with an emphasis on low overhead, robustness, and flexibility to perform security enhancements and instrumentation. Originally targeted to Linux x86-32 binaries, Zipr now supports 32- and 64-bit binaries for X86, ARM, and MIPS architectures, as well as preliminary supp… ▽ More

    Submitted 1 December, 2023; originally announced December 2023.

    Comments: 5 pages

  2. arXiv:2304.04846  [pdf, other

    cs.CR cs.SE

    Helix++: A platform for efficiently securing software

    Authors: Jack W. Davidson, Jason D. Hiser, Anh Nguyen-Tuong

    Abstract: The open-source Helix++ project improves the security posture of computing platforms by applying cutting-edge cybersecurity techniques to diversify and harden software automatically. A distinguishing feature of Helix++ is that it does not require source code or build artifacts; it operates directly on software in binary form--even stripped executables and libraries. This feature is key as rebuildi… ▽ More

    Submitted 10 April, 2023; originally announced April 2023.

    Comments: 4 pages, 1 figure, white paper

    ACM Class: D.2.m

  3. Same Coverage, Less Bloat: Accelerating Binary-only Fuzzing with Coverage-preserving Coverage-guided Tracing

    Authors: Stefan Nagy, Anh Nguyen-Tuong, Jason D. Hiser, Jack W. Davidson, Matthew Hicks

    Abstract: Coverage-guided fuzzing's aggressive, high-volume testing has helped reveal tens of thousands of software security flaws. While executing billions of test cases mandates fast code coverage tracing, the nature of binary-only targets leads to reduced tracing performance. A recent advancement in binary fuzzing performance is Coverage-guided Tracing (CGT), which brings orders-of-magnitude gains in thr… ▽ More

    Submitted 7 September, 2022; originally announced September 2022.

    Comments: CCS '21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security

  4. arXiv:2104.10034  [pdf, other

    cs.CR

    On Generating and Labeling Network Traffic with Realistic, Self-Propagating Malware

    Authors: Molly Buchanan, Jeffrey W. Collyer, Jack W. Davidson, Saikat Dey, Mark Gardner, Jason D. Hiser, Jeffry Lang, Alastair Nottingham, Alina Oprea

    Abstract: Research and development of techniques which detect or remediate malicious network activity require access to diverse, realistic, contemporary data sets containing labeled malicious connections. In the absence of such data, said techniques cannot be meaningfully trained, tested, and evaluated. Synthetically produced data containing fabricated or merged network traffic is of limited value as it is… ▽ More

    Submitted 27 May, 2022; v1 submitted 20 April, 2021; originally announced April 2021.

    Comments: 4+2 pages, 3 figures, 1 table, for AI4CS-SDM21