Search
Now showing items 1-4 of 4
Comprehensive Java Metadata Tracking for Attack Detection and Repair
(2019-11-19)
We present ClearTrack, a system that tracks 32 bits of metadata for each primitive value in Java programs to detect and nullify a range of vulnerabilities such as integer overflow and underflow vulnerabilities, SQL injection ...
Faster Dynamic Controllability Checking in Temporal Networks with Integer Bounds
(International Joint Conference in Artificial Intelligence, 2019-08)
Simple Temporal Networks with Uncertainty (STNUs) provide a useful formalism with which to reason about events and the temporal constraints that apply to them. STNUs are in particular notable because they facilitate reasoning ...
Precise and Comprehensive Provenance Tracking for Android Devices
(2019-11-19)
Detailed information about the paths that data take through a system is invaluable for understanding sources and behaviors of complex exfiltration malware. We present a new system, ClearScope, that tracks, at the level of ...
Automatic Exploitation of Fully Randomized Executables
(2019-06-11)
We present Marten, a new end to end system for automatically discovering, exploiting, and combining information leakage and buffer overflow vulnerabilities to derandomize and exploit remote, fully randomized processes. ...