Skip to main content

Showing 1–10 of 10 results for author: Micinski, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.03991  [pdf, other

    cs.CR cs.LG

    Assemblage: Automatic Binary Dataset Construction for Machine Learning

    Authors: Chang Liu, Rebecca Saul, Yihao Sun, Edward Raff, Maya Fuchs, Townsend Southard Pantano, James Holt, Kristopher Micinski

    Abstract: Binary code is pervasive, and binary analysis is a key task in reverse engineering, malware classification, and vulnerability discovery. Unfortunately, while there exist large corpuses of malicious binaries, obtaining high-quality corpuses of benign binaries for modern systems has proven challenging (e.g., due to licensing issues). Consequently, machine learning based pipelines for binary analysis… ▽ More

    Submitted 7 May, 2024; originally announced May 2024.

  2. arXiv:2311.02206  [pdf, other

    cs.DB cs.PL

    Modern Datalog on the GPU

    Authors: Yihao Sun, Ahmedur Rahman Shovon, Thomas Gilray, Kristopher Micinski, Sidharth Kumar

    Abstract: Modern deductive database engines (e.g., LogicBlox and Soufflé) enable their users to write declarative queries which compute recursive deductions over extensional data, leaving their high-performance operationalization (query planning, semi-naïve evaluation, and parallelization) to the engine. Such engines form the backbone of modern high-throughput applications in static analysis, security audit… ▽ More

    Submitted 10 March, 2024; v1 submitted 3 November, 2023; originally announced November 2023.

  3. arXiv:2211.11573  [pdf, other

    cs.PL

    Higher-Order, Data-Parallel Structured Deduction

    Authors: Thomas Gilray, Arash Sahebolamri, Sidharth Kumar, Kristopher Micinski

    Abstract: State-of-the-art Datalog engines include expressive features such as ADTs (structured heap values), stratified aggregation and negation, various primitive operations, and the opportunity for further extension using FFIs. Current parallelization approaches for state-of-art Datalogs target shared-memory locking data-structures using conventional multi-threading, or use the map-reduce model for distr… ▽ More

    Submitted 21 November, 2022; originally announced November 2022.

  4. arXiv:2107.12909  [pdf, ps, other

    cs.PL

    So You Want to Analyze Scheme Programs With Datalog?

    Authors: Davis Ross Silverman, Yihao Sun, Kristopher Micinski, Thomas Gilray

    Abstract: Static analysis approximates the results of a program by examining only its syntax. For example, control-flow analysis (CFA) determines which syntactic lambdas (for functional languages) or (for object-oriented) methods may be invoked at each call site within a program. Rich theoretical results exist studying control flow analysis for Scheme-like languages, but implementations are often complex an… ▽ More

    Submitted 27 July, 2021; originally announced July 2021.

  5. arXiv:2101.04718  [pdf, other

    cs.PL cs.CR

    Declarative Demand-Driven Reverse Engineering

    Authors: Yihao Sun, Jeffrey Ching, Kristopher Micinski

    Abstract: Binary reverse engineering is a challenging task because it often necessitates reasoning using both domain-specific knowledge (e.g., understanding entrypoint idioms common to an ABI) and logical inference (e.g., reconstructing interprocedural control flow). To help perform these tasks, reverse engineers often use toolkits (such as IDA Pro or Ghidra) that allow them to interactively explicate prope… ▽ More

    Submitted 12 January, 2021; originally announced January 2021.

  6. arXiv:1912.00317  [pdf, other

    cs.CR cs.HC

    An Observational Investigation of Reverse Engineers' Processes

    Authors: Daniel Votipka, Seth M. Rabin, Kristopher Micinski, Jeffrey S. Foster, Michelle L. Mazurek

    Abstract: Reverse engineering is a complex process essential to software-security tasks such as vulnerability discovery and malware analysis. Significant research and engineering effort has gone into develo** tools to support reverse engineers. However, little work has been done to understand the way reverse engineers think when analyzing programs, leaving tool developers to make interface design decision… ▽ More

    Submitted 30 November, 2019; originally announced December 2019.

    Comments: 22 pages, 6 figures, to appear at the 2020 USENIX Security Symposium

  7. arXiv:1807.09377  [pdf, other

    cs.PL

    Racets: Faceted Execution in Racket

    Authors: Kristopher Micinski, Zhanpeng Wang, Thomas Gilray

    Abstract: Faceted Execution is a linguistic paradigm for dynamic information-flow control. Under faceted execution, secure program data is represented by faceted values: decision trees that encode how the data should appear to its owner (represented by a label) versus everyone else. When labels are allowed to be first-class (i.e., predicates that decide at runtime which data to reveal), faceted execution en… ▽ More

    Submitted 24 July, 2018; originally announced July 2018.

  8. arXiv:1504.03711  [pdf, other

    cs.CR

    Checking Interaction-Based Declassification Policies for Android Using Symbolic Execution

    Authors: Kristopher Micinski, Jonathan Fetter-Degges, **seong Jeon, Jeffrey S. Foster, Michael R. Clarkson

    Abstract: Mobile apps can access a wide variety of secure information, such as contacts and location. However, current mobile platforms include only coarse access control mechanisms to protect such data. In this paper, we introduce interaction-based declassification policies, in which the user's interactions with the app constrain the release of sensitive information. Our policies are defined extensionally,… ▽ More

    Submitted 29 July, 2015; v1 submitted 14 April, 2015; originally announced April 2015.

    Comments: This research was supported in part by NSF grants CNS-1064997 and 1421373, AFOSR grants FA9550-12-1-0334 and FA9550-14-1-0334, a partnership between UMIACS and the Laboratory for Telecommunication Sciences, and the National Security Agency

  9. arXiv:1401.4492  [pdf, ps, other

    cs.LO

    Temporal Logics for Hyperproperties

    Authors: Michael R. Clarkson, Bernd Finkbeiner, Masoud Koleini, Kristopher K. Micinski, Markus N. Rabe, César Sánchez

    Abstract: Two new logics for verification of hyperproperties are proposed. Hyperproperties characterize security policies, such as noninterference, as a property of sets of computation paths. Standard temporal logics such as LTL, CTL, and CTL* can refer only to a single path at a time, hence cannot express many hyperproperties of interest. The logics proposed here, HyperLTL and HyperCTL*, add explicit and s… ▽ More

    Submitted 20 January, 2014; v1 submitted 17 January, 2014; originally announced January 2014.

  10. arXiv:1306.5678  [pdf, ps, other

    cs.LO cs.CR

    A Temporal Logic of Security

    Authors: Masoud Koleini, Michael R. Clarkson, Kristopher K. Micinski

    Abstract: A new logic for verification of security policies is proposed. The logic, HyperLTL, extends linear-time temporal logic (LTL) with connectives for explicit and simultaneous quantification over multiple execution paths, thereby enabling HyperLTL to express information-flow security policies that LTL cannot. A model-checking algorithm for a fragment of HyperLTL is given, and the algorithm is implemen… ▽ More

    Submitted 9 July, 2013; v1 submitted 24 June, 2013; originally announced June 2013.