Skip to main content

Showing 1–3 of 3 results for author: Quirk, P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2312.04749  [pdf, other

    cs.CR

    Make out like a (Multi-Armed) Bandit: Improving the Odds of Fuzzer Seed Scheduling with T-Scheduler

    Authors: Simon Luo, Adrian Herrera, Paul Quirk, Michael Chase, Damith C. Ranasinghe, Salil S. Kanhere

    Abstract: Fuzzing is a highly-scalable software testing technique that uncovers bugs in a target program by executing it with mutated inputs. Over the life of a fuzzing campaign, the fuzzer accumulates inputs inducing new and interesting target behaviors, drawing from these inputs for further mutation. This rapidly results in a large number of inputs to select from, making it challenging to quickly and accu… ▽ More

    Submitted 7 December, 2023; originally announced December 2023.

    Comments: 12 pages, 4 figures, Accepted paper at AsiaCCS2024

  2. arXiv:2308.07860  [pdf, other

    cs.CR

    SplITS: Split Input-to-State Map** for Effective Firmware Fuzzing

    Authors: Guy Farrelly, Paul Quirk, Salil S. Kanhere, Seyit Camtepe, Damith C. Ranasinghe

    Abstract: Ability to test firmware on embedded devices is critical to discovering vulnerabilities prior to their adversarial exploitation. State-of-the-art automated testing methods rehost firmware in emulators and attempt to facilitate inputs from a diversity of methods (interrupt driven, status polling) and a plethora of devices (such as modems and GPS units). Despite recent progress to tackle peripheral… ▽ More

    Submitted 15 August, 2023; originally announced August 2023.

    Comments: Accepted ESORICS 2023

  3. arXiv:2209.10414  [pdf, other

    cs.CR cs.AI cs.LG

    Statement-Level Vulnerability Detection: Learning Vulnerability Patterns Through Information Theory and Contrastive Learning

    Authors: Van Nguyen, Trung Le, Chakkrit Tantithamthavorn, Michael Fu, John Grundy, Hung Nguyen, Seyit Camtepe, Paul Quirk, Dinh Phung

    Abstract: Software vulnerabilities are a serious and crucial concern. Typically, in a program or function consisting of hundreds or thousands of source code statements, there are only a few statements causing the corresponding vulnerabilities. Most current approaches to vulnerability labelling are done on a function or program level by experts with the assistance of machine learning tools. Extending this ap… ▽ More

    Submitted 11 June, 2024; v1 submitted 19 September, 2022; originally announced September 2022.