Výsledky vyhledávání - Security and privacy Software and applications security Software security engineering
-
1
Wemint:Tainting Sensitive Data Leaks in WeChat Mini-Programs
ISSN: 2643-1572Vydáno: IEEE 11.09.2023Vydáno v IEEE/ACM International Conference on Automated Software Engineering : [proceedings] (11.09.2023)“… However, MiniApps raise new security and privacy concerns as they can access partially or all of host apps' system resources, including sensitive personal data…”
Získat plný text
Konferenční příspěvek -
2
Decoding Secret Memorization in Code LLMs Through Token-Level Characterization
ISSN: 1558-1225Vydáno: IEEE 26.04.2025Vydáno v Proceedings / International Conference on Software Engineering (26.04.2025)“… However, their training process inadvertently leads to the memorization of sensitive information, posing severe privacy risks…”
Získat plný text
Konferenční příspěvek -
3
IntraFuzz: Coverage-Guided Intra-Enclave Fuzzing for Intel SGX Applications
Vydáno: IEEE 22.06.2025Vydáno v 2025 62nd ACM/IEEE Design Automation Conference (DAC) (22.06.2025)“…Intel SGX is susceptible to intra-enclave software vulnerabilities. Existing automated bug-finding methods primarily focus on fuzzing enclave boundaries for SGX applications in simulated, rather than actual hardware-protected enclaves…”
Získat plný text
Konferenční příspěvek -
4
COBRA: Interaction-Aware Bytecode-Level Vulnerability Detector for Smart Contracts
ISSN: 2643-1572Vydáno: ACM 27.10.2024Vydáno v IEEE/ACM International Conference on Automated Software Engineering : [proceedings] (27.10.2024)“…The detection of vulnerabilities in smart contracts remains a significant challenge. While numerous tools are available for analyzing smart contracts in source…”
Získat plný text
Konferenční příspěvek -
5
Rewrite to Reinforce: Rewriting the Binary to Apply Countermeasures against Fault Injection
Vydáno: IEEE 05.12.2021Vydáno v 2021 58th ACM/IEEE Design Automation Conference (DAC) (05.12.2021)“…Fault injection attacks can cause errors in software for malicious purposes. Oftentimes, vulnerable points of a program are detected after its development…”
Získat plný text
Konferenční příspěvek -
6
LeanBin: Harnessing Lifting and Recompilation to Debloat Binaries
ISSN: 2643-1572Vydáno: ACM 27.10.2024Vydáno v IEEE/ACM International Conference on Automated Software Engineering : [proceedings] (27.10.2024)“… The dynamically recorded execution traces capture the required subset of instructions and control flow of the application binary for a given set of inputs…”
Získat plný text
Konferenční příspěvek -
7
Attention! Your Copied Data is Under Monitoring: A Systematic Study of Clipboard Usage in Android Apps
ISSN: 1558-1225Vydáno: ACM 14.04.2024Vydáno v Proceedings / International Conference on Software Engineering (14.04.2024)“…Recently, clipboard usage has become prevalent in mobile apps allowing users to copy and paste text within the same app or across different apps. However,…”
Získat plný text
Konferenční příspěvek -
8
Rotten Apples Spoil the Bunch: An Anatomy of Google Play Malware
ISSN: 1558-1225Vydáno: ACM 01.05.2022Vydáno v 2022 IEEE/ACM 44th International Conference on Software Engineering (ICSE) (01.05.2022)“…This paper provides an in-depth analysis of Android malware that bypassed the strictest defenses of the Google Play application store and penetrated the official Android market between January 2016 and July 2021…”
Získat plný text
Konferenční příspěvek -
9
Self-hiding behavior in Android apps: detection and characterization
ISBN: 9781450356381, 1450356389ISSN: 1558-1225Vydáno: New York, NY, USA ACM 27.05.2018Vydáno v 2018 IEEE/ACM 40th International Conference on Software Engineering (ICSE) (27.05.2018)“…Applications (apps) that conceal their activities are fundamentally deceptive; app marketplaces and end-users should treat such apps as suspicious…”
Získat plný text
Konferenční příspěvek -
10
SmartBugs: A Framework to Analyze Solidity Smart Contracts
ISSN: 2643-1572Vydáno: ACM 01.09.2020Vydáno v 2020 35th IEEE/ACM International Conference on Automated Software Engineering (ASE) (01.09.2020)“…Over the last few years, there has been substantial research on automated analysis, testing, and debugging of Ethereum smart contracts. However, it is not…”
Získat plný text
Konferenční příspěvek -
11
Prompt-to-SQL Injections in LLM-Integrated Web Applications: Risks and Defenses
ISSN: 1558-1225Vydáno: IEEE 26.04.2025Vydáno v Proceedings / International Conference on Software Engineering (26.04.2025)“… We characterize \mathrm{P}_{2} \text{SQL} injections, exploring their variants and impact on application security through multiple concrete examples…”
Získat plný text
Konferenční příspěvek -
12
Combining Fine-Tuning and LLM-Based Agents for Intuitive Smart Contract Auditing with Justifications
ISSN: 1558-1225Vydáno: IEEE 26.04.2025Vydáno v Proceedings / International Conference on Software Engineering (26.04.2025)“…Smart contracts are decentralized applications built atop blockchains like Ethereum…”
Získat plný text
Konferenční příspěvek -
13
Hiding Critical Program Components via Ambiguous Translation
ISSN: 1558-1225Vydáno: ACM 01.05.2022Vydáno v 2022 IEEE/ACM 44th International Conference on Software Engineering (ICSE) (01.05.2022)“…Software systems may contain critical program components such as patented program logic or sensitive data…”
Získat plný text
Konferenční příspěvek -
14
Effective Vulnerable Function Identification based on CVE Description Empowered by Large Language Models
ISSN: 2643-1572Vydáno: ACM 27.10.2024Vydáno v IEEE/ACM International Conference on Automated Software Engineering : [proceedings] (27.10.2024)“…Open-source software (OSS) has profoundly transformed the software development paradigm by facilitating effortless code reuse…”
Získat plný text
Konferenční příspěvek -
15
On Prescription or Off Prescription? An Empirical Study of Community-Prescribed Security Configurations for Kubernetes
ISSN: 1558-1225Vydáno: IEEE 26.04.2025Vydáno v Proceedings / International Conference on Software Engineering (26.04.2025)“…Despite being beneficial for rapid delivery of software, Kubernetes deployments can be susceptible to security attacks, which can cause serious consequences…”
Získat plný text
Konferenční příspěvek -
16
MEMLOCK: Memory Usage Guided Fuzzing
ISSN: 1558-1225Vydáno: ACM 01.10.2020Vydáno v 2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE) (01.10.2020)“…Uncontrolled memory consumption is a kind of critical software security weaknesses…”
Získat plný text
Konferenční příspěvek -
17
Preserving Privacy in Software Composition Analysis: A Study of Technical Solutions and Enhancements
ISSN: 1558-1225Vydáno: IEEE 26.04.2025Vydáno v Proceedings / International Conference on Software Engineering (26.04.2025)“…Software composition analysis (SCA) denotes the process of identifying open-source software components in an input software application…”
Získat plný text
Konferenční příspěvek -
18
MVD: Memory-Related Vulnerability Detection Based on Flow-Sensitive Graph Neural Networks
ISSN: 1558-1225Vydáno: ACM 01.05.2022Vydáno v 2022 IEEE/ACM 44th International Conference on Software Engineering (ICSE) (01.05.2022)“…Memory-related vulnerabilities constitute severe threats to the security of modern software…”
Získat plný text
Konferenční příspěvek -
19
Windranger: A Directed Greybox Fuzzer driven by Deviation Basic Blocks
ISSN: 1558-1225Vydáno: ACM 01.05.2022Vydáno v 2022 IEEE/ACM 44th International Conference on Software Engineering (ICSE) (01.05.2022)“…Directed grey-box fuzzing (DGF) is a security testing technique that aims to steer the fuzzer towards predefined target sites in the program…”
Získat plný text
Konferenční příspěvek -
20
Build and Runtime Integrity for Java
ISSN: 2574-1934Vydáno: IEEE 27.04.2025Vydáno v Proceedings (IEEE/ACM International Conference on Software Engineering Companion. Online) (27.04.2025)“…Software Supply Chain attacks are increasingly threatening the security of software systems, with the potential to compromise both build and runtime integrity…”
Získat plný text
Konferenční příspěvek

