Search Results - Security and privacy Software and application security Software security engineering
-
1
Wemint:Tainting Sensitive Data Leaks in WeChat Mini-Programs
ISSN: 2643-1572Published: IEEE 11.09.2023Published in IEEE/ACM International Conference on Automated Software Engineering : [proceedings] (11.09.2023)“… However, MiniApps raise new security and privacy concerns as they can access partially or all of host apps' system resources, including sensitive personal data…”
Get full text
Conference Proceeding -
2
Decoding Secret Memorization in Code LLMs Through Token-Level Characterization
ISSN: 1558-1225Published: IEEE 26.04.2025Published in Proceedings / International Conference on Software Engineering (26.04.2025)“… However, their training process inadvertently leads to the memorization of sensitive information, posing severe privacy risks…”
Get full text
Conference Proceeding -
3
COBRA: Interaction-Aware Bytecode-Level Vulnerability Detector for Smart Contracts
ISSN: 2643-1572Published: ACM 27.10.2024Published in IEEE/ACM International Conference on Automated Software Engineering : [proceedings] (27.10.2024)“…The detection of vulnerabilities in smart contracts remains a significant challenge. While numerous tools are available for analyzing smart contracts in source…”
Get full text
Conference Proceeding -
4
IntraFuzz: Coverage-Guided Intra-Enclave Fuzzing for Intel SGX Applications
Published: IEEE 22.06.2025Published in 2025 62nd ACM/IEEE Design Automation Conference (DAC) (22.06.2025)“…Intel SGX is susceptible to intra-enclave software vulnerabilities. Existing automated bug-finding methods primarily focus on fuzzing enclave boundaries for SGX applications in simulated, rather than actual hardware-protected enclaves…”
Get full text
Conference Proceeding -
5
Rewrite to Reinforce: Rewriting the Binary to Apply Countermeasures against Fault Injection
Published: IEEE 05.12.2021Published in 2021 58th ACM/IEEE Design Automation Conference (DAC) (05.12.2021)“…Fault injection attacks can cause errors in software for malicious purposes. Oftentimes, vulnerable points of a program are detected after its development…”
Get full text
Conference Proceeding -
6
Attention! Your Copied Data is Under Monitoring: A Systematic Study of Clipboard Usage in Android Apps
ISSN: 1558-1225Published: ACM 14.04.2024Published in Proceedings / International Conference on Software Engineering (14.04.2024)“…Recently, clipboard usage has become prevalent in mobile apps allowing users to copy and paste text within the same app or across different apps. However,…”
Get full text
Conference Proceeding -
7
LeanBin: Harnessing Lifting and Recompilation to Debloat Binaries
ISSN: 2643-1572Published: ACM 27.10.2024Published in IEEE/ACM International Conference on Automated Software Engineering : [proceedings] (27.10.2024)“… The dynamically recorded execution traces capture the required subset of instructions and control flow of the application binary for a given set of inputs…”
Get full text
Conference Proceeding -
8
Rotten Apples Spoil the Bunch: An Anatomy of Google Play Malware
ISSN: 1558-1225Published: ACM 01.05.2022Published in 2022 IEEE/ACM 44th International Conference on Software Engineering (ICSE) (01.05.2022)“…This paper provides an in-depth analysis of Android malware that bypassed the strictest defenses of the Google Play application store and penetrated the official Android market between January 2016 and July 2021…”
Get full text
Conference Proceeding -
9
SmartBugs: A Framework to Analyze Solidity Smart Contracts
ISSN: 2643-1572Published: ACM 01.09.2020Published in 2020 35th IEEE/ACM International Conference on Automated Software Engineering (ASE) (01.09.2020)“…Over the last few years, there has been substantial research on automated analysis, testing, and debugging of Ethereum smart contracts. However, it is not…”
Get full text
Conference Proceeding -
10
Self-hiding behavior in Android apps: detection and characterization
ISBN: 9781450356381, 1450356389ISSN: 1558-1225Published: New York, NY, USA ACM 27.05.2018Published in 2018 IEEE/ACM 40th International Conference on Software Engineering (ICSE) (27.05.2018)“…Applications (apps) that conceal their activities are fundamentally deceptive; app marketplaces and end-users should treat such apps as suspicious…”
Get full text
Conference Proceeding -
11
MEMLOCK: Memory Usage Guided Fuzzing
ISSN: 1558-1225Published: ACM 01.10.2020Published in 2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE) (01.10.2020)“…Uncontrolled memory consumption is a kind of critical software security weaknesses…”
Get full text
Conference Proceeding -
12
Combining Fine-Tuning and LLM-Based Agents for Intuitive Smart Contract Auditing with Justifications
ISSN: 1558-1225Published: IEEE 26.04.2025Published in Proceedings / International Conference on Software Engineering (26.04.2025)“…Smart contracts are decentralized applications built atop blockchains like Ethereum…”
Get full text
Conference Proceeding -
13
MVD: Memory-Related Vulnerability Detection Based on Flow-Sensitive Graph Neural Networks
ISSN: 1558-1225Published: ACM 01.05.2022Published in 2022 IEEE/ACM 44th International Conference on Software Engineering (ICSE) (01.05.2022)“…Memory-related vulnerabilities constitute severe threats to the security of modern software…”
Get full text
Conference Proceeding -
14
ReGuard: finding reentrancy bugs in smart contracts
ISBN: 145035663X, 9781450356633ISSN: 2574-1934Published: New York, NY, USA ACM 27.05.2018Published in 2018 IEEE/ACM 40th International Conference on Software Engineering: Companion (ICSE-Companion) (27.05.2018)“… As a special form of computer program, smart contract can hardly get rid of bugs. Even worse, an exploitable security bug can lead to catastrophic consequences, e.g…”
Get full text
Conference Proceeding -
15
Hiding Critical Program Components via Ambiguous Translation
ISSN: 1558-1225Published: ACM 01.05.2022Published in 2022 IEEE/ACM 44th International Conference on Software Engineering (ICSE) (01.05.2022)“…Software systems may contain critical program components such as patented program logic or sensitive data…”
Get full text
Conference Proceeding -
16
Windranger: A Directed Greybox Fuzzer driven by Deviation Basic Blocks
ISSN: 1558-1225Published: ACM 01.05.2022Published in 2022 IEEE/ACM 44th International Conference on Software Engineering (ICSE) (01.05.2022)“…Directed grey-box fuzzing (DGF) is a security testing technique that aims to steer the fuzzer towards predefined target sites in the program…”
Get full text
Conference Proceeding -
17
On Prescription or Off Prescription? An Empirical Study of Community-Prescribed Security Configurations for Kubernetes
ISSN: 1558-1225Published: IEEE 26.04.2025Published in Proceedings / International Conference on Software Engineering (26.04.2025)“…Despite being beneficial for rapid delivery of software, Kubernetes deployments can be susceptible to security attacks, which can cause serious consequences…”
Get full text
Conference Proceeding -
18
Prompt-to-SQL Injections in LLM-Integrated Web Applications: Risks and Defenses
ISSN: 1558-1225Published: IEEE 26.04.2025Published in Proceedings / International Conference on Software Engineering (26.04.2025)“… We characterize \mathrm{P}_{2} \text{SQL} injections, exploring their variants and impact on application security through multiple concrete examples…”
Get full text
Conference Proceeding -
19
Effective Vulnerable Function Identification based on CVE Description Empowered by Large Language Models
ISSN: 2643-1572Published: ACM 27.10.2024Published in IEEE/ACM International Conference on Automated Software Engineering : [proceedings] (27.10.2024)“…Open-source software (OSS) has profoundly transformed the software development paradigm by facilitating effortless code reuse…”
Get full text
Conference Proceeding -
20
Preserving Privacy in Software Composition Analysis: A Study of Technical Solutions and Enhancements
ISSN: 1558-1225Published: IEEE 26.04.2025Published in Proceedings / International Conference on Software Engineering (26.04.2025)“…Software composition analysis (SCA) denotes the process of identifying open-source software components in an input software application…”
Get full text
Conference Proceeding

