Zobrazeno 1 - 10
of 42
pro vyhledávání: '"McCamant, Stephen"'
As with any fuzzer, directing Generator-Based Fuzzers (GBF) to reach particular code targets can increase the fuzzer's effectiveness. In previous work, coverage-guided fuzzers used a mix of static analysis, taint analysis, and constraint-solving appr
Externí odkaz:
http://arxiv.org/abs/2406.02034
The last level cache is vulnerable to timing based side channel attacks because it is shared by the attacker and the victim processes even if they are located on different cores. These timing attacks evict the victim cache lines using small conflict
Externí odkaz:
http://arxiv.org/abs/1909.12302
Autor:
Emamdoost, Navid, McCamant, Stephen
Software-based fault isolation (SFI) is a technique to isolate a potentially faulty or malicious software module from the rest of a system using instruction-level rewriting. SFI implementations on CISC architectures, including Google Native Client, u
Externí odkaz:
http://arxiv.org/abs/1803.00169
Autor:
Kim, Seonmo, McCamant, Stephen
Approximate model counting for bit-vector SMT formulas (generalizing \#SAT) has many applications such as probabilistic inference and quantitative information-flow security, but it is computationally difficult. Adding random parity constraints (XOR s
Externí odkaz:
http://arxiv.org/abs/1712.07770
Independently developed codebases typically contain many segments of code that perform same or closely related operations (semantic clones). Finding functionally equivalent segments enables applications like replacing a segment by a more efficient or
Externí odkaz:
http://arxiv.org/abs/1707.01536
Autor:
McCamant, Stephen
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2008.
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Spec
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Spec
Externí odkaz:
http://hdl.handle.net/1721.1/44903
Autor:
McCamant, Stephen
Executing untrusted code while preserving security requires that thecode be prevented from modifying memory or executing instructionsexcept as explicitly allowed. Software-based fault isolation (SFI) or"sandboxing" enforces such a policy by rewriting
Externí odkaz:
http://hdl.handle.net/1721.1/32546
Autor:
McCamant, Stephen, Morrisett, Greg
Executing untrusted code while preserving security requiresenforcement of memory and control-flow safety policies:untrusted code must be prevented from modifying memory orexecuting code except as explicitly allowed. Software-basedfault isolation (SFI
Externí odkaz:
http://hdl.handle.net/1721.1/30542
Autor:
McCamant, Stephen, Ernst, Michael D.
This report presents a new, automatic technique to assess whether replacing a component of a softwaresystem by a purportedly compatible component may change the behavior of the system. The techniqueoperates before integrating the new component into t
Externí odkaz:
http://hdl.handle.net/1721.1/30455
Publikováno v:
Tools and Algorithms for the Construction and Analysis of Systems
Path-merging is a known technique for accelerating symbolic execution. One technique, named “veritesting” by Avgerinos et al. uses summaries of bounded control-flow regions and has been shown to accelerate symbolic execution of binary code. But,