Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleFebruary 2025
SENSAI: Large Language Models as Applied Cybersecurity Tutors
SIGCSETS 2025: Proceedings of the 56th ACM Technical Symposium on Computer Science Education V. 1Pages 833–839https://doi.org/10.1145/3641554.3701801The modern educational landscape faces the challenge of maintaining effective, personalized mentorship amid expanding class sizes. This challenge is particularly pronounced in fields requiring hands-on practice, such as cybersecurity education. Teaching ...
- research-articleDecember 2024
Trust, Because You Can't Verify: Privacy and Security Hurdles in Education Technology Acquisition Practices
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications SecurityPages 1656–1670https://doi.org/10.1145/3658644.3690353The education technology (EdTech) landscape is expanding rapidly in higher education institutes (HEIs). This growth brings enormous complexity. Protecting the extensive data collected by these tools is crucial for HEIs as data breaches and misuses can ...
- research-articleDecember 2024
Fuzz to the Future: Uncovering Occluded Future Vulnerabilities via Robust Fuzzing
- Arvind S Raj,
- Wil Gibbs,
- Fangzhou Dong,
- Jayakrishna Menon Vadayath,
- Michael Tompkins,
- Steven Wirsz,
- Yibo Liu,
- Zhenghao Hu,
- Chang Zhu,
- Gokulkrishna Praveen Menon,
- Brendan Dolan-Gavitt,
- Adam Doupé,
- Ruoyu Wang,
- Yan Shoshitaishvili,
- Tiffany Bao
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications SecurityPages 3719–3733https://doi.org/10.1145/3658644.3690278The security landscape of software systems has witnessed considerable advancements through dynamic testing methodologies, especially fuzzing. Traditionally, fuzzing involves a sequential, cyclic process where software is tested to identify crashes. These ...
- research-articleNovember 2024
Browser Polygraph: Efficient Deployment of Coarse-Grained Browser Fingerprints for Web-Scale Detection of Fraud Browsers
- Faezeh Kalantari,
- Mehrnoosh Zaeifi,
- Yeganeh Safaei,
- Marzieh Bitaab,
- Adam Oest,
- Gianluca Stringhini,
- Yan Shoshitaishvili,
- Adam Doupé
IMC '24: Proceedings of the 2024 ACM on Internet Measurement ConferencePages 681–703https://doi.org/10.1145/3646547.3688455In this paper, we address the prevalent issue of account takeover (ATO) fraud, which significantly impacts businesses through stolen user information. Websites have adopted risk-based authentication, incorporating browser fingerprinting techniques to ...
- research-articleSeptember 2024
From Victims to Defenders: An Exploration of the Phishing Attack Reporting Ecosystem
- Zhibo Sun,
- Faris Bugra Kokulu,
- Penghui Zhang,
- Adam Oest,
- Gianluca Stringhini,
- Tiffany Bao,
- Ruoyu Wang,
- Yan Shoshitaishvili,
- Adam Doupé,
- Gail-Joon Ahn
RAID '24: Proceedings of the 27th International Symposium on Research in Attacks, Intrusions and DefensesPages 49–64https://doi.org/10.1145/3678890.3678926Reporting phishing attacks can significantly shorten the time required to take down their operations and deter further victimization by the same phishing websites. However, little research has been conducted to understand the phishing reporting ...
-
- research-articleAugust 2024
Operation mango: scalable discovery of taint-style vulnerabilities in binary firmware services
- Wil Gibbs,
- Arvind S Raj,
- Jayakrishna Menon Vadayath,
- Hui Jun Tay,
- Justin Miller,
- Akshay Ajayan,
- Zion Leonahenahe Basque,
- Audrey Dutcher,
- Fangzhou Dong,
- Xavier Maso,
- Giovanni Vigna,
- Christopher Kruegel,
- Adam Doupé,
- Yan Shoshitaishvili,
- Ruoyu Wang
SEC '24: Proceedings of the 33rd USENIX Conference on Security SymposiumArticle No.: 398, Pages 7123–7139The rise of IoT (Internet of Things) devices has created a system of convenience, which allows users to control and automate almost everything in their homes. But this increase in convenience comes with increased security risks to the users of IoT ...
- research-articleAugust 2024
TYGR: type inference on stripped binaries using graph neural networks
- Chang Zhu,
- Ziyang Li,
- Anton Xue,
- Ati Priya Bajaj,
- Wil Gibbs,
- Yibo Liu,
- Rajeev Alur,
- Tiffany Bao,
- Hanjun Dai,
- Adam Doupé,
- Mayur Naik,
- Yan Shoshitaishvili,
- Ruoyu Wang,
- Aravind Machiry
SEC '24: Proceedings of the 33rd USENIX Conference on Security SymposiumArticle No.: 240, Pages 4283–4300Binary type inference is a core research challenge in binary program analysis and reverse engineering. It concerns identifying the data types of registers and memory values in a stripped executable (or object file), whose type information is discarded ...
- research-articleAugust 2024
Take a step further: understanding page spray in linux kernel exploitation
- Ziyi Guo,
- Dang K Le,
- Zhenpeng Lin,
- Kyle Zeng,
- Ruoyu Wang,
- Tiffany Bao,
- Yan Shoshitaishvili,
- Adam Doupé,
- Xinyu Xing
SEC '24: Proceedings of the 33rd USENIX Conference on Security SymposiumArticle No.: 67, Pages 1189–1206Recently, a novel method known as Page Spray emerges, focusing on page-level exploitation for kernel vulnerabilities. Despite the advantages it offers in terms of exploitability, stability, and compatibility, comprehensive research on Page Spray remains ...
- research-articleAugust 2024
Ahoy SAILR! there is no need to DREAM of C: a compiler-aware structuring algorithm for binary decompilation
- Zion Leonahenahe Basque,
- Ati Priya Bajaj,
- Wil Gibbs,
- Jude O'Kain,
- Derron Miao,
- Tiffany Bao,
- Adam Doupé,
- Yan Shoshitaishvili,
- Ruoyu Wang
SEC '24: Proceedings of the 33rd USENIX Conference on Security SymposiumArticle No.: 21, Pages 361–378Contrary to prevailing wisdom, we argue that the measure of binary decompiler success is not to eliminate all gotos or reduce the complexity of the decompiled code but to get as close as possible to the original source code. Many gotos exist in the ...
- research-articleJuly 2024
The WMDP benchmark: measuring and reducing malicious use with unlearning
- Nathaniel Li,
- Alexander Pan,
- Anjali Gopal,
- Summer Yue,
- Daniel Berrios,
- Alice Gatti,
- Justin D. Li,
- Ann-Kathrin Dombrowski,
- Shashwat Goel,
- Gabriel Mukobi,
- Nathan Helm-Burger,
- Rassin Lababidi,
- Lennart Justen,
- Andrew B. Liu,
- Michael Chen,
- Isabelle Barrass,
- Oliver Zhang,
- Xiaoyuan Zhu,
- Rishub Tamirisa,
- Bhrugu Bharathi,
- Ariel Herbert-Voss,
- Cort B. Breuer,
- Andy Zou,
- Mantas Mazeika,
- Zifan Wang,
- Palash Oswal,
- Weiran Lin,
- Adam A. Hunt,
- Justin Tienken-Harder,
- Kevin Y. Shih,
- Kemper Talley,
- John Guan,
- Ian Steneker,
- David Campbell,
- Brad Jokubaitis,
- Steven Basart,
- Stephen Fitz,
- Ponnurangam Kumaraguru,
- Kallol Krishna Karmakar,
- Uday Tupakula,
- Vijay Varadharajan,
- Yan Shoshitaishvili,
- Jimmy Ba,
- Kevin M. Esvelt,
- Alexandr Wang,
- Dan Hendrycks
ICML'24: Proceedings of the 41st International Conference on Machine LearningArticle No.: 1145, Pages 28525–28550The White House Executive Order on Artificial Intelligence highlights the risks of large language models (LLMs) empowering malicious actors in developing biological, cyber, and chemical weapons. To measure these risks, government institutions and major ...
- ArticleJuly 2024
SandPuppy: Deep-State Fuzzing Guided by Automatic Detection of State-Representative Variables
Detection of Intrusions and Malware, and Vulnerability AssessmentPages 227–250https://doi.org/10.1007/978-3-031-64171-8_12AbstractCurrent state-of-the-art automated fuzzing approaches cannot explore deep program-states without human assistance. Recently, Ijon allowed humans to provide code-annotations on the target to expose program state to the fuzzer. However, this ...
- research-articleJuly 2024
Deep Dive into Client-Side Anti-Phishing: A Longitudinal Study Bridging Academia and Industry
- Rana Pourmohamad,
- Steven Wirsz,
- Adam Oest,
- Tiffany Bao,
- Yan Shoshitaishvili,
- Ruoyu Wang,
- Adam Doupé,
- Rida A. Bazzi
ASIA CCS '24: Proceedings of the 19th ACM Asia Conference on Computer and Communications SecurityPages 638–653https://doi.org/10.1145/3634737.3657027Client-side anti-phishing methods are crucial for safeguarding individuals against phishing attacks, offering a proactive approach beyond traditional blocklisting strategies. This study expands the scope to include a comprehensive evaluation of client-...
- research-articleJune 2024
Nothing Personal: Understanding the Spread and Use of Personally Identifiable Information in the Financial Ecosystem
- Mehrnoosh Zaeifi,
- Faezeh Kalantari,
- Adam Oest,
- Zhibo Sun,
- Gail-Joon Ahn,
- Yan Shoshitaishvili,
- Tiffany Bao,
- Ruoyu Wang,
- Adam Doupé
CODASPY '24: Proceedings of the Fourteenth ACM Conference on Data and Application Security and PrivacyPages 55–65https://doi.org/10.1145/3626232.3653266Online services leverage various authentication methods with differing usability and reliability trade-offs, such as password-based or multi-factor authentication (MFA). However, financial service providers face a unique challenge; authenticating the ...
- research-articleMarch 2024
PWN The Learning Curve: Education-First CTF Challenges
SIGCSE 2024: Proceedings of the 55th ACM Technical Symposium on Computer Science Education V. 1Pages 937–943https://doi.org/10.1145/3626252.3630912We address the pressing need for effective and scalable cybersecurity education methodologies for undergraduate students. While Capture The Flag (CTF) challenges have been instrumental for some learners, for many novices CTF challenges are simply too ...
- research-articleMarch 2024
DOJO: Applied Cybersecurity Education in the Browser
SIGCSE 2024: Proceedings of the 55th ACM Technical Symposium on Computer Science Education V. 1Pages 930–936https://doi.org/10.1145/3626252.3630836This paper introduces DOJO, a state-of-the-art, open-source learning platform for hands-on cybersecurity education that aims to minimize barriers for both students and instructors. DOJO draws insight and inspiration from the Capture The Flag (CTF) ...
- research-articleNovember 2023
RetSpill: Igniting User-Controlled Data to Burn Away Linux Kernel Protections
CCS '23: Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications SecurityPages 3093–3107https://doi.org/10.1145/3576915.3623220Leveraging a control flow hijacking primitive (CFHP) to gain root privileges is critical to attackers striving to exploit Linux kernel vulnerabilities. Such attack has become increasingly elusive as security researchers propose capable kernel security ...
- research-articleAugust 2023
Greenhouse: single-service rehosting of linux-based firmware binaries in user-space emulation
- Hui Jun Tay,
- Kyle Zeng,
- Jayakrishna Menon Vadayath,
- Arvind S Raj,
- Audrey Dutcher,
- Tejesh Reddy,
- Wil Gibbs,
- Zion Leonahenahe Basque,
- Fangzhou Dong,
- Zack Smith,
- Adam Doupé,
- Tiffany Bao,
- Yan Shoshitaishvili,
- Ruoyu Wang
SEC '23: Proceedings of the 32nd USENIX Conference on Security SymposiumArticle No.: 324, Pages 5791–5808As IoT devices grow more widespread, scaling current analysis techniques to match becomes an increasingly critical task. Part of this challenge involves not only rehosting the firmware of these embedded devices in an emulated environment, but to do so and ...
- research-articleNovember 2022
Mitigating Threats Emerging from the Interaction between SDN Apps and SDN (Configuration) Datastore
CCSW'22: Proceedings of the 2022 on Cloud Computing Security WorkshopPages 23–39https://doi.org/10.1145/3560810.3564265Software-defined networking (SDN) has established itself in networking and standardization efforts are under way to strengthen the next generation of this essential technology. The Network Management Datastore Architecture (NMDA), RFC 8342, is the ...
- research-articleNovember 2022
I'm SPARTACUS, No, I'm SPARTACUS: Proactively Protecting Users from Phishing by Intentionally Triggering Cloaking Behavior
- Penghui Zhang,
- Zhibo Sun,
- Sukwha Kyung,
- Hans Walter Behrens,
- Zion Leonahenahe Basque,
- Haehyun Cho,
- Adam Oest,
- Ruoyu Wang,
- Tiffany Bao,
- Yan Shoshitaishvili,
- Gail-Joon Ahn,
- Adam Doupé
CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications SecurityPages 3165–3179https://doi.org/10.1145/3548606.3559334Phishing is a ubiquitous and increasingly sophisticated online threat. To evade mitigations, phishers try to "cloak" malicious content from defenders to delay their appearance on blacklists, while still presenting the phishing payload to victims. This ...
- research-articleOctober 2022
Context-Auditor: Context-sensitive Content Injection Mitigation
RAID '22: Proceedings of the 25th International Symposium on Research in Attacks, Intrusions and DefensesPages 431–445https://doi.org/10.1145/3545948.3545992Cross-site scripting (XSS) is the most common vulnerability class in web applications over the last decade. Much research attention has focused on building exploit mitigation defenses for this problem, but no technique provides adequate protection in ...