Search Results - Security and privacy Software and application security Software security engineering

Refine Results
  1. 1

    Wemint:Tainting Sensitive Data Leaks in WeChat Mini-Programs by Meng, Shi, Wang, Liu, Wang, Shenao, Wang, Kailong, Xiao, Xusheng, Bai, Guangdong, Wang, Haoyu

    ISSN: 2643-1572
    Published: IEEE 11.09.2023
    “… However, MiniApps raise new security and privacy concerns as they can access partially or all of host apps' system resources, including sensitive personal data…”
    Get full text
    Conference Proceeding
  2. 2

    Decoding Secret Memorization in Code LLMs Through Token-Level Characterization by Nie, Yuqing, Wang, Chong, Wang, Kailong, Xu, Guoai, Xu, Guosheng, Wang, Haoyu

    ISSN: 1558-1225
    Published: IEEE 26.04.2025
    “… However, their training process inadvertently leads to the memorization of sensitive information, posing severe privacy risks…”
    Get full text
    Conference Proceeding
  3. 3

    COBRA: Interaction-Aware Bytecode-Level Vulnerability Detector for Smart Contracts by Li, Wenkai, Li, Xiaoqi, Li, Zongwei, Zhang, Yuqing

    ISSN: 2643-1572
    Published: ACM 27.10.2024
    “…The detection of vulnerabilities in smart contracts remains a significant challenge. While numerous tools are available for analyzing smart contracts in source…”
    Get full text
    Conference Proceeding
  4. 4

    IntraFuzz: Coverage-Guided Intra-Enclave Fuzzing for Intel SGX Applications by Cui, Jinhua, Peng, Qiao, Yao, Yiwen, Ye, Ke, Zhang, Jiliang

    Published: IEEE 22.06.2025
    “…Intel SGX is susceptible to intra-enclave software vulnerabilities. Existing automated bug-finding methods primarily focus on fuzzing enclave boundaries for SGX applications in simulated, rather than actual hardware-protected enclaves…”
    Get full text
    Conference Proceeding
  5. 5

    Rewrite to Reinforce: Rewriting the Binary to Apply Countermeasures against Fault Injection by Kiaei, Pantea, Breunesse, Cees-Bart, Ahmadi, Mohsen, Schaumont, Patrick, Woudenberg, Jasper van

    Published: IEEE 05.12.2021
    “…Fault injection attacks can cause errors in software for malicious purposes. Oftentimes, vulnerable points of a program are detected after its development…”
    Get full text
    Conference Proceeding
  6. 6

    Attention! Your Copied Data is Under Monitoring: A Systematic Study of Clipboard Usage in Android Apps by Chen, Yongliang, Tang, Ruoqin, Zuo, Chaoshun, Zhang, Xiaokuan, Xue, Lei, Luo, Xiapu, Zhao, Qingchuan

    ISSN: 1558-1225
    Published: ACM 14.04.2024
    “…Recently, clipboard usage has become prevalent in mobile apps allowing users to copy and paste text within the same app or across different apps. However,…”
    Get full text
    Conference Proceeding
  7. 7

    LeanBin: Harnessing Lifting and Recompilation to Debloat Binaries by Wodiany, Igor, Pop, Antoniu, Lujan, Mikel

    ISSN: 2643-1572
    Published: ACM 27.10.2024
    “… The dynamically recorded execution traces capture the required subset of instructions and control flow of the application binary for a given set of inputs…”
    Get full text
    Conference Proceeding
  8. 8

    Rotten Apples Spoil the Bunch: An Anatomy of Google Play Malware by Cao, Michael, Ahmed, Khaled, Rubin, Julia

    ISSN: 1558-1225
    Published: ACM 01.05.2022
    “…This paper provides an in-depth analysis of Android malware that bypassed the strictest defenses of the Google Play application store and penetrated the official Android market between January 2016 and July 2021…”
    Get full text
    Conference Proceeding
  9. 9

    SmartBugs: A Framework to Analyze Solidity Smart Contracts by Ferreira, Joao F., Cruz, Pedro, Durieux, Thomas, Abreu, Rui

    ISSN: 2643-1572
    Published: ACM 01.09.2020
    “…Over the last few years, there has been substantial research on automated analysis, testing, and debugging of Ethereum smart contracts. However, it is not…”
    Get full text
    Conference Proceeding
  10. 10

    Self-hiding behavior in Android apps: detection and characterization by Shan, Zhiyong, Neamtiu, Iulian, Samuel, Raina

    ISBN: 9781450356381, 1450356389
    ISSN: 1558-1225
    Published: New York, NY, USA ACM 27.05.2018
    “…Applications (apps) that conceal their activities are fundamentally deceptive; app marketplaces and end-users should treat such apps as suspicious…”
    Get full text
    Conference Proceeding
  11. 11

    MEMLOCK: Memory Usage Guided Fuzzing by Wen, Cheng, Wang, Haijun, Li, Yuekang, Qin, Shengchao, Liu, Yang, Xu, Zhiwu, Chen, Hongxu, Xie, Xiaofei, Pu, Geguang, Liu, Ting

    ISSN: 1558-1225
    Published: ACM 01.10.2020
    “…Uncontrolled memory consumption is a kind of critical software security weaknesses…”
    Get full text
    Conference Proceeding
  12. 12

    Combining Fine-Tuning and LLM-Based Agents for Intuitive Smart Contract Auditing with Justifications by Ma, Wei, Wu, Daoyuan, Sun, Yuqiang, Wang, Tianwen, Liu, Shangqing, Zhang, Jian, Xue, Yue, Liu, Yang

    ISSN: 1558-1225
    Published: IEEE 26.04.2025
    “…Smart contracts are decentralized applications built atop blockchains like Ethereum…”
    Get full text
    Conference Proceeding
  13. 13

    MVD: Memory-Related Vulnerability Detection Based on Flow-Sensitive Graph Neural Networks by Cao, Sicong, Sun, Xiaobing, Bo, Lili, Wu, Rongxin, Li, Bin, Tao, Chuanqi

    ISSN: 1558-1225
    Published: ACM 01.05.2022
    “…Memory-related vulnerabilities constitute severe threats to the security of modern software…”
    Get full text
    Conference Proceeding
  14. 14

    ReGuard: finding reentrancy bugs in smart contracts by Liu, Chao, Liu, Han, Cao, Zhao, Chen, Zhong, Chen, Bangdao, Roscoe, Bill

    ISBN: 145035663X, 9781450356633
    ISSN: 2574-1934
    Published: New York, NY, USA ACM 27.05.2018
    “… As a special form of computer program, smart contract can hardly get rid of bugs. Even worse, an exploitable security bug can lead to catastrophic consequences, e.g…”
    Get full text
    Conference Proceeding
  15. 15

    Hiding Critical Program Components via Ambiguous Translation by Jung, Chijung, Kim, Doowon, Chen, An, Wang, Weihang, Zheng, Yunhui, Lee, Kyu Hyung, Kwon, Yonghwi

    ISSN: 1558-1225
    Published: ACM 01.05.2022
    “…Software systems may contain critical program components such as patented program logic or sensitive data…”
    Get full text
    Conference Proceeding
  16. 16

    Windranger: A Directed Greybox Fuzzer driven by Deviation Basic Blocks by Du, Zhengjie, Li, Yuekang, Liu, Yang, Mao, Bing

    ISSN: 1558-1225
    Published: ACM 01.05.2022
    “…Directed grey-box fuzzing (DGF) is a security testing technique that aims to steer the fuzzer towards predefined target sites in the program…”
    Get full text
    Conference Proceeding
  17. 17

    On Prescription or Off Prescription? An Empirical Study of Community-Prescribed Security Configurations for Kubernetes by Shamim, Shazibul Islam, Hu, Hanyang, Rahman, Akond

    ISSN: 1558-1225
    Published: IEEE 26.04.2025
    “…Despite being beneficial for rapid delivery of software, Kubernetes deployments can be susceptible to security attacks, which can cause serious consequences…”
    Get full text
    Conference Proceeding
  18. 18

    Prompt-to-SQL Injections in LLM-Integrated Web Applications: Risks and Defenses by Pedro, Rodrigo, Coimbra, Miguel E., Castro, Daniel, Carreira, Paulo, Santos, Nuno

    ISSN: 1558-1225
    Published: IEEE 26.04.2025
    “… We characterize \mathrm{P}_{2} \text{SQL} injections, exploring their variants and impact on application security through multiple concrete examples…”
    Get full text
    Conference Proceeding
  19. 19

    Effective Vulnerable Function Identification based on CVE Description Empowered by Large Language Models by Wu, Yulun, Wen, Ming, Yu, Zeliang, Guo, Xiaochen, Jin, Hai

    ISSN: 2643-1572
    Published: ACM 27.10.2024
    “…Open-source software (OSS) has profoundly transformed the software development paradigm by facilitating effortless code reuse…”
    Get full text
    Conference Proceeding
  20. 20

    Preserving Privacy in Software Composition Analysis: A Study of Technical Solutions and Enhancements by Wang, Huaijin, Liu, Zhibo, Dai, Yanbo, Wang, Shuai, Tang, Qiyi, Nie, Sen, Wu, Shi

    ISSN: 1558-1225
    Published: IEEE 26.04.2025
    “…Software composition analysis (SCA) denotes the process of identifying open-source software components in an input software application…”
    Get full text
    Conference Proceeding