Skip to main content

Showing 1–11 of 11 results for author: Pham, L H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.14781  [pdf, other

    cs.CR cs.AI

    Unified Neural Backdoor Removal with Only Few Clean Samples through Unlearning and Relearning

    Authors: Nay Myat Min, Long H. Pham, Jun Sun

    Abstract: The application of deep neural network models in various security-critical applications has raised significant security concerns, particularly the risk of backdoor attacks. Neural backdoors pose a serious security threat as they allow attackers to maliciously alter model behavior. While many defenses have been explored, existing approaches are often bounded by model-specific constraints, or necess… ▽ More

    Submitted 23 May, 2024; originally announced May 2024.

  2. arXiv:2307.02289  [pdf, other

    cs.CR cs.SE

    Fuzzing with Quantitative and Adaptive Hot-Bytes Identification

    Authors: Tai D. Nguyen, Long H. Pham, Jun Sun

    Abstract: Fuzzing has emerged as a powerful technique for finding security bugs in complicated real-world applications. American fuzzy lop (AFL), a leading fuzzing tool, has demonstrated its powerful bug finding ability through a vast number of reported CVEs. However, its random mutation strategy is unable to generate test inputs that satisfy complicated branching conditions (e.g., magic-byte comparisons, c… ▽ More

    Submitted 5 July, 2023; originally announced July 2023.

  3. arXiv:2209.09327  [pdf, ps, other

    cs.PL cs.SE

    S2TD: a Separation Logic Verifier that Supports Reasoning of the Absence and Presence of Bugs

    Authors: Quang Loc Le, Jun Sun, Long H. Pham, Shengchao Qin

    Abstract: Heap-manipulating programs are known to be challenging to reason about. We present a novel verifier for heap-manipulating programs called S2TD, which encodes programs systematically in the form of Constrained Horn Clauses (CHC) using a novel extension of separation logic (SL) with recursive predicates and dangling predicates. S2TD actively explores cyclic proofs to address the path explosion probl… ▽ More

    Submitted 19 September, 2022; originally announced September 2022.

    Comments: 24 pages

    MSC Class: 68N15

  4. arXiv:2205.06992  [pdf, other

    cs.CR cs.LG

    Verifying Neural Networks Against Backdoor Attacks

    Authors: Long H. Pham, Jun Sun

    Abstract: Neural networks have achieved state-of-the-art performance in solving many problems, including many applications in safety/security-critical systems. Researchers also discovered multiple security issues associated with neural networks. One of them is backdoor attacks, i.e., a neural network may be embedded with a backdoor such that a target output is almost always generated in the presence of a tr… ▽ More

    Submitted 14 May, 2022; originally announced May 2022.

  5. arXiv:2101.01917  [pdf, other

    cs.CR cs.SE

    sGUARD: Towards Fixing Vulnerable Smart Contracts Automatically

    Authors: Tai D. Nguyen, Long H. Pham, Jun Sun

    Abstract: Smart contracts are distributed, self-enforcing programs executing on top of blockchain networks. They have the potential to revolutionize many industries such as financial institutes and supply chains. However, smart contracts are subject to code-based vulnerabilities, which casts a shadow on its applications. As smart contracts are unpatchable (due to the immutability of blockchain), it is essen… ▽ More

    Submitted 6 January, 2021; originally announced January 2021.

    Comments: Published in IEEE S&P 2021

  6. arXiv:2007.11206  [pdf, other

    cs.LG stat.ML

    SOCRATES: Towards a Unified Platform for Neural Network Analysis

    Authors: Long H. Pham, Jiaying Li, Jun Sun

    Abstract: Studies show that neural networks, not unlike traditional programs, are subject to bugs, e.g., adversarial samples that cause classification errors and discriminatory instances that demonstrate the lack of fairness. Given that neural networks are increasingly applied in critical applications (e.g., self-driving cars, face recognition systems and personal credit rating systems), it is desirable tha… ▽ More

    Submitted 5 February, 2021; v1 submitted 22 July, 2020; originally announced July 2020.

  7. arXiv:2004.08563  [pdf, other

    cs.SE

    sFuzz: An Efficient Adaptive Fuzzer for Solidity Smart Contracts

    Authors: Tai D. Nguyen, Long H. Pham, Jun Sun, Yun Lin, Quang Tran Minh

    Abstract: Smart contracts are Turing-complete programs that execute on the infrastructure of the blockchain, which often manage valuable digital assets. Solidity is one of the most popular programming languages for writing smart contracts on the Ethereum platform. Like traditional programs, smart contracts may contain vulnerabilities. Unlike traditional programs, smart contracts cannot be easily patched onc… ▽ More

    Submitted 18 April, 2020; originally announced April 2020.

    Comments: ICSE2020

  8. arXiv:1908.10051  [pdf, ps, other

    cs.PL

    Compositional Verification of Heap-Manipulating Programs through Property-Guided Learning

    Authors: Long H. Pham, Jun Sun, Quang Loc Le

    Abstract: Analyzing and verifying heap-manipulating programs automatically is challenging. A key for fighting the complexity is to develop compositional methods. For instance, many existing verifiers for heap-manipulating programs require user-provided specification for each function in the program in order to decompose the verification problem. The requirement, however, often hinders the users from applyin… ▽ More

    Submitted 27 August, 2019; originally announced August 2019.

  9. arXiv:1907.05637  [pdf, other

    cs.PL

    Concolic Testing Heap-Manipulating Programs

    Authors: Long H. Pham, Quang Loc Le, Quoc-Sang Phan, Jun Sun

    Abstract: Concolic testing is a test generation technique which works effectively by integrating random testing generation and symbolic execution. Existing concolic testing engines focus on numeric programs. Heap-manipulating programs make extensive use of complex heap objects like trees and lists. Testing such programs is challenging due to multiple reasons. Firstly, test inputs for such program are requir… ▽ More

    Submitted 12 July, 2019; originally announced July 2019.

  10. arXiv:1712.06025  [pdf, other

    cs.SE

    Enhancing Symbolic Execution of Heap-based Programs with Separation Logic for Test Input Generation

    Authors: Long H. Pham, Quang Loc Le, Quoc-Sang Phan, Jun Sun, Shengchao Qin

    Abstract: Symbolic execution is a well established method for test input generation. Despite of having achieved tremendous success over numerical domains, existing symbolic execution techniques for heap-based programs are limited due to the lack of a succinct and precise description for symbolic values over unbounded heaps. In this work, we present a new symbolic execution method for heap-based programs bas… ▽ More

    Submitted 16 September, 2019; v1 submitted 16 December, 2017; originally announced December 2017.

  11. Learning Likely Invariants to Explain Why a Program Fails

    Authors: Jun Sun, Long H. Pham, Lyly Tran Thi, **gyi Wang, Xin Peng

    Abstract: Debugging is difficult. Recent studies show that automatic bug localization techniques have limited usefulness. One of the reasons is that programmers typically have to understand why the program fails before fixing it. In this work, we aim to help programmers understand a bug by automatically generating likely invariants which are violated in the failed tests. Given a program with an initial asse… ▽ More

    Submitted 27 October, 2016; originally announced October 2016.

    Comments: 10 pages