Skip to main content

Showing 1–10 of 10 results for author: Ruef, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:1907.01679  [pdf, other

    cs.CR

    Build It, Break It, Fix It: Contesting Secure Development

    Authors: James Parker, Michael Hicks, Andrew Ruef, Michelle L. Mazurek, Dave Levin, Daniel Votipka, Piotr Mardziel, Kelsey R. Fulton

    Abstract: Typical security contests focus on breaking or mitigating the impact of buggy systems. We present the Build-it, Break-it, Fix-it (BIBIFI) contest, which aims to assess the ability to securely build software, not just break it. In BIBIFI, teams build specified software with the goal of maximizing correctness, performance, and security. The latter is tested when teams attempt to break other teams' s… ▽ More

    Submitted 2 July, 2019; originally announced July 2019.

    Comments: 35pgs. Extension of arXiv:1606.01881 which was a conference paper previously published in CCS 2016. This is a journal version submitted to TOPS

  2. arXiv:1903.12113  [pdf, ps, other

    cs.SE

    A Counterexample-guided Approach to Finding Numerical Invariants

    Authors: ThanhVu Nguyen, Timos Antopoulos, Andrew Ruef, Michael Hicks

    Abstract: Numerical invariants, e.g., relationships among numerical variables in a program, represent a useful class of properties to analyze programs. General polynomial invariants represent more complex numerical relations, but they are often required in many scientific and engineering applications. We present NumInv, a tool that implements a counterexample-guided invariant generation (CEGIR) technique to… ▽ More

    Submitted 28 March, 2019; originally announced March 2019.

    Journal ref: 11th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE), pages 605--615. ACM, 2017

  3. arXiv:1808.09700  [pdf, other

    cs.CR

    Evaluating Fuzz Testing

    Authors: George Klees, Andrew Ruef, Benji Cooper, Shiyi Wei, Michael Hicks

    Abstract: Fuzz testing has enjoyed great success at discovering security critical bugs in real software. Recently, researchers have devoted significant effort to devising new fuzzing techniques, strategies, and algorithms. Such new ideas are primarily evaluated experimentally so an important question is: What experimental setup is needed to produce trustworthy results? We surveyed the recent research litera… ▽ More

    Submitted 18 October, 2018; v1 submitted 29 August, 2018; originally announced August 2018.

    Journal ref: Proceedings of the ACM Conference on Computer and Communications Security (CCS) 2018

  4. Evaluating Design Tradeoffs in Numeric Static Analysis for Java

    Authors: Shiyi Wei, Piotr Mardziel, Andrew Ruef, Jeffrey S. Foster, Michael Hicks

    Abstract: Numeric static analysis for Java has a broad range of potentially useful applications, including array bounds checking and resource usage estimation. However, designing a scalable numeric static analysis for real-world Java programs presents a multitude of design choices, each of which may interact with others. For example, an analysis could handle method calls via either a top-down or bottom-up i… ▽ More

    Submitted 24 February, 2018; originally announced February 2018.

  5. arXiv:1701.04739  [pdf, other

    cs.CR cs.LG

    Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning

    Authors: Rock Stevens, Octavian Suciu, Andrew Ruef, Sanghyun Hong, Michael Hicks, Tudor Dumitraş

    Abstract: Governments and businesses increasingly rely on data analytics and machine learning (ML) for improving their competitive edge in areas such as consumer satisfaction, threat intelligence, decision making, and product efficiency. However, by cleverly corrupting a subset of data used as input to a target's ML algorithms, an adversary can perturb outcomes and compromise the effectiveness of ML technol… ▽ More

    Submitted 17 January, 2017; originally announced January 2017.

  6. arXiv:1607.02171  [pdf, other

    cs.AI

    Argumentation Models for Cyber Attribution

    Authors: Eric Nunes, Paulo Shakarian, Gerardo I. Simari, Andrew Ruef

    Abstract: A major challenge in cyber-threat analysis is combining information from different sources to find the person or the group responsible for the cyber-attack. It is one of the most important technical and policy challenges in cyber-security. The lack of ground truth for an individual responsible for an attack has limited previous studies. In this paper, we take a first step towards overcoming this l… ▽ More

    Submitted 7 July, 2016; originally announced July 2016.

    Comments: 8 pages paper to be presented at International Symposium on Foundations of Open Source Intelligence and Security Informatics (FOSINT-SI) 2016 In conjunction with ASONAM 2016 San Francisco, CA, USA, August 19-20, 2016

  7. Build It, Break It, Fix It: Contesting Secure Development

    Authors: Andrew Ruef, Michael Hicks, James Parker, Dave Levin, Michelle L. Mazurek, Piotr Mardziel

    Abstract: Typical security contests focus on breaking or mitigating the impact of buggy systems. We present the Build-it Break-it Fix-it BIBIFI contest which aims to assess the ability to securely build software not just break it. In BIBIFI teams build specified software with the goal of maximizing correctness performance and security. The latter is tested when teams attempt to break other teams submissions… ▽ More

    Submitted 19 August, 2016; v1 submitted 6 June, 2016; originally announced June 2016.

  8. arXiv:1507.01922  [pdf, other

    cs.CR

    Cyber-Deception and Attribution in Capture-the-Flag Exercises

    Authors: Eric Nunes, Nimish Kulkarni, Paulo Shakarian, Andrew Ruef, Jay Little

    Abstract: Attributing the culprit of a cyber-attack is widely considered one of the major technical and policy challenges of cyber-security. The lack of ground truth for an individual responsible for a given attack has limited previous studies. Here, we overcome this limitation by leveraging DEFCON capture-the-flag (CTF) exercise data where the actual ground-truth is known. In this work, we use various clas… ▽ More

    Submitted 7 July, 2015; originally announced July 2015.

    Comments: 4 pages Short name accepted to FOSINT-SI 2015

  9. arXiv:1501.05990  [pdf

    cs.CY cs.CR

    Cyber Attacks and Public Embarrassment: A Survey of Some Notable Hacks

    Authors: Jana Shakarian, Paulo Shakarian, Andrew Ruef

    Abstract: We hear it all too often in the media: an organization is attacked, its data, often containing personally identifying information, is made public, and a hacking group emerges to claim credit. In this excerpt, we discuss how such groups operate and describe the details of a few major cyber-attacks of this sort in the wider context of how they occurred. We feel that understanding how such groups hav… ▽ More

    Submitted 23 January, 2015; originally announced January 2015.

  10. arXiv:1309.6450  [pdf

    cs.CR cs.CY

    The Dragon and the Computer: Why Intellectual Property Theft is Compatible with Chinese Cyber-Warfare Doctrine

    Authors: Paulo Shakarian, Jana Shakarian, Andrew Ruef

    Abstract: Along with the USA and Russia, China is often considered one of the leading cyber-powers in the world. In this excerpt, we explore how Chinese military thought, developed in the 1990s, influenced their cyber-operations in the early 2000s. In particular, we examine the ideas of "Unrestricted Warfare" and "Active Offense" and discuss how they can permit for the theft of intellectual property. We the… ▽ More

    Submitted 25 September, 2013; originally announced September 2013.

    Comments: This is an excerpt from the upcoming book Introduction to Cyber-Warfare: A Multidisciplinary Approach published by Syngress (ISBN: 978-0124078147)