Skip to main content

Showing 1–9 of 9 results for author: Rodler, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2304.06341  [pdf, other

    cs.CR

    EF/CF: High Performance Smart Contract Fuzzing for Exploit Generation

    Authors: Michael Rodler, David Paaßen, Wenting Li, Lukas Bernhard, Thorsten Holz, Ghassan Karame, Lucas Davi

    Abstract: Smart contracts are increasingly being used to manage large numbers of high-value cryptocurrency accounts. There is a strong demand for automated, efficient, and comprehensive methods to detect security vulnerabilities in a given contract. While the literature features a plethora of analysis methods for smart contracts, the existing proposals do not address the increasing complexity of contracts.… ▽ More

    Submitted 13 April, 2023; originally announced April 2023.

    Comments: To be published at Euro S&P 2023

  2. arXiv:2203.04117  [pdf, other

    cs.CR

    xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based Pointer Tagging on Intel x86-64

    Authors: Lukas Bernhard, Michael Rodler, Thorsten Holz, Lucas Davi

    Abstract: Memory safety in complex applications implemented in unsafe programming languages such as C/C++ is still an unresolved problem in practice. Many different types of defenses have been proposed in the past to mitigate this problem. The most promising next step is a tighter integration of the hardware and software level: modern mitigation techniques are either accelerated using hardware extensions or… ▽ More

    Submitted 8 March, 2022; originally announced March 2022.

  3. arXiv:2203.00364  [pdf, other

    cs.CR

    Practical Mitigation of Smart Contract Bugs

    Authors: Jens-Rene Giesen, Sebastien Andreina, Michael Rodler, Ghassan O. Karame, Lucas Davi

    Abstract: In spite of their popularity, develo** secure smart contracts remains a challenging task. Existing solutions are either impractical as they do not support many complex real-world contracts or leave the burden to developers for fixing bugs. In this paper, we propose the first practical smart contract compiler, called HCC, which automatically inserts security hardening checks at the source-code le… ▽ More

    Submitted 1 March, 2022; originally announced March 2022.

  4. arXiv:2108.07076  [pdf, other

    cs.CR

    My Fuzzer Beats Them All! Develo** a Framework for Fair Evaluation and Comparison of Fuzzers

    Authors: David Paaßen, Sebastian Surminski, Michael Rodler, Lucas Davi

    Abstract: Fuzzing has become one of the most popular techniques to identify bugs in software. To improve the fuzzing process, a plethora of techniques have recently appeared in academic literature. However, evaluating and comparing these techniques is challenging as fuzzers depend on randomness when generating test inputs. Commonly, existing evaluations only partially follow best practices for fuzzing evalu… ▽ More

    Submitted 16 August, 2021; originally announced August 2021.

    Comments: A slightly shorter version of this paper will be published at ESORICS 2021

  5. arXiv:2010.00341  [pdf, other

    cs.CR cs.DC

    EVMPatch: Timely and Automated Patching of Ethereum Smart Contracts

    Authors: Michael Rodler, Wenting Li, Ghassan O. Karame, Lucas Davi

    Abstract: Recent attacks exploiting errors in smart contract code had devastating consequences thereby questioning the benefits of this technology. It is currently highly challenging to fix errors and deploy a patched contract in time. Instant patching is especially important since smart contracts are always online due to the distributed nature of blockchain systems. They also manage considerable amounts of… ▽ More

    Submitted 2 October, 2020; v1 submitted 1 October, 2020; originally announced October 2020.

    Comments: A slightly shorter version of this paper will be published at USENIX Security Symposium 2021

  6. arXiv:2007.07586  [pdf, other

    cs.CR

    TeeRex: Discovery and Exploitation of Memory Corruption Vulnerabilities in SGX Enclaves

    Authors: Tobias Cloosters, Michael Rodler, Lucas Davi

    Abstract: Intel's Software Guard Extensions (SGX) introduced new instructions to switch the processor to enclave mode which protects it from introspection. While the enclave mode strongly protects the memory and the state of the processor, it cannot withstand memory corruption errors inside the enclave code. In this paper, we show that the attack surface of SGX enclaves provides new challenges for enclave d… ▽ More

    Submitted 16 July, 2020; v1 submitted 15 July, 2020; originally announced July 2020.

    Comments: To be published at the 29th USENIX Security Symposium 2020 (https://www.usenix.org/conference/usenixsecurity20/presentation/cloosters)

  7. arXiv:1812.08310  [pdf, other

    cs.CR

    Control Behavior Integrity for Distributed Cyber-Physical Systems

    Authors: Sridhar Adepu, Ferdinand Brasser, Luis Garcia, Michael Rodler, Lucas Davi, Ahmad-Reza Sadeghi, Saman Zonouz

    Abstract: Cyber-physical control systems, such as industrial control systems (ICS), are increasingly targeted by cyberattacks. Such attacks can potentially cause tremendous damage, affect critical infrastructure or even jeopardize human life when the system does not behave as intended. Cyberattacks, however, are not new and decades of security research have developed plenty of solutions to thwart them. Unfo… ▽ More

    Submitted 19 December, 2018; originally announced December 2018.

    Comments: 15 pages, 8 figures

  8. arXiv:1812.05934  [pdf, other

    cs.CR

    Sereum: Protecting Existing Smart Contracts Against Re-Entrancy Attacks

    Authors: Michael Rodler, Wenting Li, Ghassan O. Karame, Lucas Davi

    Abstract: Recently, a number of existing blockchain systems have witnessed major bugs and vulnerabilities within smart contracts. Although the literature features a number of proposals for securing smart contracts, these proposals mostly focus on proving the correctness or absence of a certain type of vulnerability within a contract, but cannot protect deployed (legacy) contracts from being exploited. In th… ▽ More

    Submitted 14 December, 2018; originally announced December 2018.

  9. ANANAS - A Framework For Analyzing Android Applications

    Authors: Thomas Eder, Michael Rodler, Dieter Vymazal, Markus Zeilinger

    Abstract: Android is an open software platform for mobile devices with a large market share in the smartphone sector. The openness of the system as well as its wide adoption lead to an increasing amount of malware developed for this platform. ANANAS is an expandable and modular framework for analyzing Android applications. It takes care of common needs for dynamic malware analysis and provides an interface… ▽ More

    Submitted 20 July, 2013; originally announced July 2013.

    Comments: Paper accepted at First Int. Workshop on Emerging Cyberthreats and Countermeasures ECTCM 2013