Zobrazeno 1 - 5
of 5
pro vyhledávání: '"Bhat, Koustubha"'
Autor:
Oberhauser, Jonas, Chehab, Rafael Lourenco de Lima, Behrens, Diogo, Fu, Ming, Paolillo, Antonio, Oberhauser, Lilith, Bhat, Koustubha, Wen, Yuzhong, Chen, Haibo, Kim, Jaeho, Vafeiadis, Viktor
This technical report contains material accompanying our work with same title published at ASPLOS'21. We start in Sec. 1 with a detailed presentation of the core innovation of this work, Await Model Checking (AMC). The correctness proofs of AMC can b
Externí odkaz:
http://arxiv.org/abs/2102.06590
Dataflow tracking with Dynamic Taint Analysis (DTA) is an important method in systems security with many applications, including exploit analysis, guided fuzzing, and side-channel information leak detection. However, DTA is fundamentally limited by t
Externí odkaz:
http://arxiv.org/abs/1909.03461
Autor:
Sasaki, Hiroshi, Arroyo, Miguel A., Ziad, M. Tarek Ibn, Bhat, Koustubha, Sinha, Kanad, Sethumadhavan, Simha
Recent rapid strides in memory safety tools and hardware have improved software quality and security. While coarse-grained memory safety has improved, achieving memory safety at the granularity of individual objects remains a challenge due to high pe
Externí odkaz:
http://arxiv.org/abs/1906.01838
Publikováno v:
Ryan, G, Shah, A, She, D, Bhat, K & Jana, S 2021, Fine grained dataflow tracking with proximal gradients . in USENIX Security '21 : Proceedings of the 30th USENIX Security Symposium . USENIX Association, pp. 1611-1628, 30th USENIX Security Symposium, USENIX Security 2021, Virtual, Online, 11/08/21 . < https://www.usenix.org/conference/usenixsecurity21/presentation/ryan >
USENIX Security '21: Proceedings of the 30th USENIX Security Symposium, 1611-1628
STARTPAGE=1611;ENDPAGE=1628;TITLE=USENIX Security '21
USENIX Security '21: Proceedings of the 30th USENIX Security Symposium, 1611-1628
STARTPAGE=1611;ENDPAGE=1628;TITLE=USENIX Security '21
Dataflow tracking with Dynamic Taint Analysis (DTA) is an important method in systems security with many applications, including exploit analysis, guided fuzzing, and side-channel information leak detection. However, DTA is fundamentally limited by t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ef94f96731f99598374218b166e930e6
https://hdl.handle.net/1871.1/63698450-379a-474c-9dac-94d263468ff4
https://hdl.handle.net/1871.1/63698450-379a-474c-9dac-94d263468ff4
Publikováno v:
Proceedings of the Twenty-Fourth International Conference on Architectural Support for Programming Languages and Operating Systems
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=sygma_______::21467f8ad0d6f8d16972f0b3d01031bd