Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleAugust 2024
Operation mango: scalable discovery of taint-style vulnerabilities in binary firmware services
- Wil Gibbs,
- Arvind S Raj,
- Jayakrishna Menon Vadayath,
- Hui Jun Tay,
- Justin Miller,
- Akshay Ajayan,
- Zion Leonahenahe Basque,
- Audrey Dutcher,
- Fangzhou Dong,
- Xavier Maso,
- Giovanni Vigna,
- Christopher Kruegel,
- Adam Doupé,
- Yan Shoshitaishvili,
- Ruoyu Wang
SEC '24: Proceedings of the 33rd USENIX Conference on Security SymposiumArticle No.: 398, Pages 7123–7139The rise of IoT (Internet of Things) devices has created a system of convenience, which allows users to control and automate almost everything in their homes. But this increase in convenience comes with increased security risks to the users of IoT ...
- research-articleAugust 2024
ChainReactor: automated privilege escalation chain discovery via AI planning
- Giulio De Pasquale,
- Ilya Grishchenko,
- Riccardo Iesari,
- Gabriel Pizarro,
- Lorenzo Cavallaro,
- Christopher Kruegel,
- Giovanni Vigna
SEC '24: Proceedings of the 33rd USENIX Conference on Security SymposiumArticle No.: 331, Pages 5913–5929Current academic vulnerability research predominantly focuses on identifying individual bugs and exploits in programs and systems. However, this goes against the growing trend of modern, advanced attacks that rely on a sequence of steps (i.e., a chain of ...
- research-articleAugust 2024
GuideEnricher: protecting the anonymity of ethereum mixing service users with deep reinforcement learning
SEC '24: Proceedings of the 33rd USENIX Conference on Security SymposiumArticle No.: 199, Pages 3549–3566Mixing services are widely employed to enhance anonymity on public blockchains. However, recent research has shown that user identities and transaction associations can be derived even with mixing services. This is mainly due to the lack of guidelines ...
- research-articleAugust 2024
Remote keylogging attacks in multi-user VR applications
- Zihao Su,
- Kunlin Cai,
- Reuben Beeler,
- Lukas Dresel,
- Allan Garcia,
- Ilya Grishchenko,
- Yuan Tian,
- Christopher Kruegel,
- Giovanni Vigna
SEC '24: Proceedings of the 33rd USENIX Conference on Security SymposiumArticle No.: 154, Pages 2743–2760As Virtual Reality (VR) applications grow in popularity, they have bridged distances and brought users closer together. However, with this growth, there have been increasing concerns about security and privacy, especially related to the motion data used ...
- research-articleOctober 2023
Shimware: Toward Practical Security Retrofitting for Monolithic Firmware Images
- Eric Gustafson,
- Paul Grosen,
- Nilo Redini,
- Saagar Jha,
- Andrea Continella,
- Ruoyu Wang,
- Kevin Fu,
- Sara Rampazzi,
- Christopher Kruegel,
- Giovanni Vigna
RAID '23: Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and DefensesPages 32–45https://doi.org/10.1145/3607199.3607217In today’s era of the Internet of Things, we are surrounded by security- and safety-critical, network-connected devices. In parallel with the rise in attacks on such devices, we have also seen an increase in devices that are abandoned, reached the end of ...
-
- research-articleOctober 2023
Container Orchestration Honeypot: Observing Attacks in the Wild
RAID '23: Proceedings of the 26th International Symposium on Research in Attacks, Intrusions and DefensesPages 381–396https://doi.org/10.1145/3607199.3607205Containers, a mechanism to package software and its dependencies into a single artifact, have helped fuel the rapid pace of technological advancements in the last few years. However, it is not always clear what the potential security risk of moving to ...
- research-articleAugust 2023
ACTOR: action-guided kernel fuzzing
- Marius Fleischer,
- Dipanjan Das,
- Priyanka Bose,
- Weiheng Bai,
- Kangjie Lu,
- Mathias Payer,
- Christopher Kruegel,
- Giovanni Vigna
SEC '23: Proceedings of the 32nd USENIX Conference on Security SymposiumArticle No.: 280, Pages 5003–5020Fuzzing reliably and efficiently finds bugs in software, including operating system kernels. In general, higher code coverage leads to the discovery of more bugs. This is why most existing kernel fuzzers adopt strategies to generate a series of inputs ...
- research-articleAugust 2023
A large scale study of the Ethereum arbitrage ecosystem
SEC '23: Proceedings of the 32nd USENIX Conference on Security SymposiumArticle No.: 185, Pages 3295–3312The Ethereum blockchain rapidly became the epicenter of a complex financial ecosystem, powered by decentralized exchanges (DEXs). These exchanges form a diverse capital market where anyone can swap one type of token for another. Arbitrage trades are a ...
- research-articleAugust 2023
Confusum contractum: confused deputy vulnerabilities in ethereum smart contracts
- Fabio Gritti,
- Nicola Ruaro,
- Robert McLaughlin,
- Priyanka Bose,
- Dipanjan Das,
- Ilya Grishchenko,
- Christopher Kruegel,
- Giovanni Vigna
SEC '23: Proceedings of the 32nd USENIX Conference on Security SymposiumArticle No.: 101, Pages 1793–1810Smart contracts are immutable programs executed in the context of a globally distributed system known as a blockchain. They enable the decentralized implementation of many interesting applications, such as financial protocols, voting systems, and supply-...
- research-articleJuly 2023
Columbus: Android App Testing through Systematic Callback Exploration
- Priyanka Bose,
- Dipanjan Das,
- Saastha Vasan,
- Sebastiano Mariani,
- Ilya Grishchenko,
- Andrea Continella,
- Antonio Bianchi,
- Christopher Kruegel,
- Giovanni Vigna
ICSE '23: Proceedings of the 45th International Conference on Software EngineeringPages 1381–1392https://doi.org/10.1109/ICSE48619.2023.00121With the continuous rise in the popularity of Android mobile devices, automated testing of apps has become more important than ever. Android apps are event-driven programs. Unfortunately, generating all possible types of events by interacting with an ...
POPKORN: Popping Windows Kernel Drivers At Scale
ACSAC '22: Proceedings of the 38th Annual Computer Security Applications ConferencePages 854–868https://doi.org/10.1145/3564625.3564631External vendors develop a significant percentage of Windows kernel drivers, and Microsoft relies on these vendors to handle all aspects of driver security. Unfortunately, device vendors are not immune to software bugs, which in some cases can be ...
- research-articleNovember 2022
Understanding Security Issues in the NFT Ecosystem
CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications SecurityPages 667–681https://doi.org/10.1145/3548606.3559342Non-Fungible Tokens (NFTs) have emerged as a way to collect digital art as well as an investment vehicle. Despite having been popularized only recently, NFT markets have witnessed several high-profile (and high-value) asset sales and a tremendous growth ...
- ArticleJune 2022
- keynoteJune 2022
Looking for Signals: A Systems Security Perspective
IH&MMSec '22: Proceedings of the 2022 ACM Workshop on Information Hiding and Multimedia SecurityPage 3https://doi.org/10.1145/3531536.3533774Over the last 20 years, my students and I have built systems that look for signals of malice in large datasets. These datasets include network traffic, program code, web transactions, and social media posts. For many of our detection systems, we used ...
- research-articleNovember 2021
Tarnhelm: Isolated, Transparent & Confidential Execution of Arbitrary Code in ARM's TrustZone
- Davide Quarta,
- Michele Ianni,
- Aravind Machiry,
- Yanick Fratantonio,
- Eric Gustafson,
- Davide Balzarotti,
- Martina Lindorfer,
- Giovanni Vigna,
- Christopher Kruegel
Checkmate '21: Proceedings of the 2021 Research on offensive and defensive techniques in the Context of Man At The End (MATE) AttacksPages 43–57https://doi.org/10.1145/3465413.3488571Protecting the confidentiality of applications on commodity operating systems, both on desktop and mobile devices, is challenging: attackers have unrestricted control over an application's processes and thus direct access to any of the application's ...
- research-articleOctober 2021
SyML: Guiding Symbolic Execution Toward Vulnerable States Through Pattern Learning
- Nicola Ruaro,
- Kyle Zeng,
- Lukas Dresel,
- Mario Polino,
- Tiffany Bao,
- Andrea Continella,
- Stefano Zanero,
- Christopher Kruegel,
- Giovanni Vigna
RAID '21: Proceedings of the 24th International Symposium on Research in Attacks, Intrusions and DefensesPages 456–468https://doi.org/10.1145/3471621.3471865Exploring many execution paths in a binary program is essential to discover new vulnerabilities. Dynamic Symbolic Execution (DSE) is useful to trigger complex input conditions and enables an accurate exploration of a program while providing extensive ...
- research-articleJune 2021
Toward a secure crowdsourced location tracking system
WiSec '21: Proceedings of the 14th ACM Conference on Security and Privacy in Wireless and Mobile NetworksPages 311–322https://doi.org/10.1145/3448300.3467821Low-energy Bluetooth devices have become ubiquitous and widely used for different applications. Among these, Bluetooth trackers are becoming popular as they allow users to track the location of their physical objects. To do so, Bluetooth trackers are ...
- research-articleJune 2021
Bran: Reduce Vulnerability Search Space in Large Open Source Repositories by Learning Bug Symptoms
- Dongyu Meng,
- Michele Guerriero,
- Aravind Machiry,
- Hojjat Aghakhani,
- Priyanka Bose,
- Andrea Continella,
- Christopher Kruegel,
- Giovanni Vigna
ASIA CCS '21: Proceedings of the 2021 ACM Asia Conference on Computer and Communications SecurityPages 731–743https://doi.org/10.1145/3433210.3453115Software is continually increasing in size and complexity, and therefore, vulnerability discovery would benefit from techniques that identify potentially vulnerable regions within large code bases, as this allows for easing vulnerability detection by ...
- research-articleJune 2021
Conware: Automated Modeling of Hardware Peripherals
- Chad Spensky,
- Aravind Machiry,
- Nilo Redini,
- Colin Unger,
- Graham Foster,
- Evan Blasband,
- Hamed Okhravi,
- Christopher Kruegel,
- Giovanni Vigna
ASIA CCS '21: Proceedings of the 2021 ACM Asia Conference on Computer and Communications SecurityPages 95–109https://doi.org/10.1145/3433210.3437532Emulation is at the core of many security analyses. However, emulating embedded systems is still not possible in most cases. To facilitate this critical analysis, we present Conware, a hardware emulation framework that can automatically generate models ...
- research-articleJanuary 2021
One Size Does Not Fit All: A Longitudinal Analysis of Brazilian Financial Malware
- Marcus Botacin,
- Hojjat Aghakhani,
- Stefano Ortolani,
- Christopher Kruegel,
- Giovanni Vigna,
- Daniela Oliveira,
- Paulo Lício De Geus,
- André Grégio
ACM Transactions on Privacy and Security (TOPS), Volume 24, Issue 2Article No.: 11, Pages 1–31https://doi.org/10.1145/3429741Malware analysis is an essential task to understand infection campaigns, the behavior of malicious codes, and possible ways to mitigate threats. Malware analysis also allows better assessment of attackers’ capabilities, techniques, and processes. ...