20032024

Research activity per year

Filter
Conference contribution

Search results

  • 2024

    Non-Fusion Based Coherent Cache Randomization Using Cross-Domain Accesses

    Ramkrishnan, K., McCamant, S., Zhai, A. & Yew, P. C., Jul 1 2024, ACM AsiaCCS 2024 - Proceedings of the 19th ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 186-202 17 p. (ACM AsiaCCS 2024 - Proceedings of the 19th ACM Asia Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2023

    Java Ranger: Supporting String and Array Operations in Java Ranger (Competition Contribution)

    Hussein, S., Yan, Q., McCamant, S., Sharma, V. & Whalen, M. W., 2023, Tools and Algorithms for the Construction and Analysis of Systems - 29th International Conference, TACAS 2023, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2022, Proceedings. Sankaranarayanan, S. & Sharygina, N. (eds.). Springer Science and Business Media Deutschland GmbH, p. 553-558 6 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13994 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    1 Scopus citations
  • Structural Test Input Generation for 3-Address Code Coverage Using Path-Merged Symbolic Execution

    Hussein, S., McCamant, S., Sherman, E., Sharma, V. & Whalen, M., 2023, Proceedings - 2023 IEEE/ACM International Conference on Automation of Software Test, AST 2023. Institute of Electrical and Electronics Engineers Inc., p. 79-89 11 p. (2023 IEEE/ACM International Conference on Automation of Software Test (AST)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2022

    Counterexample-Guided Inductive Repair of Reactive Contracts

    Hussein, S. M., Rayadurgam, S., McCamant, S., Sharma, V. B. & Heimdahl, M., 2022, Proceedings - IEEE/ACM 10th International Conference on Formal Methods in Software Engineering, FormaliSE 2022. Institute of Electrical and Electronics Engineers Inc., p. 46-57 12 p. (Proceedings - IEEE/ACM 10th International Conference on Formal Methods in Software Engineering, FormaliSE 2022).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • PREDATOR: A Cache Side-Channel Attack Detector Based on Precise Event Monitoring

    Wu, M., McCamant, S., Yew, P. C. & Zhai, A., 2022, Proceedings - 2022 IEEE International Symposium on Secure and Private Execution Environment Design, SEED 2022. Institute of Electrical and Electronics Engineers Inc., p. 25-36 12 p. (Proceedings - 2022 IEEE International Symposium on Secure and Private Execution Environment Design, SEED 2022).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • 2021

    Counterexample Guided Inductive Repair of Reactive Contracts

    Hussein, S. M., Sharma, V. B., McCamant, S., Rayadurgam, S. & Heimdahl, M., 2021, Proceedings - 2021 36th IEEE/ACM International Conference on Automated Software Engineering, ASE 2021. Institute of Electrical and Electronics Engineers Inc., p. 1190-1192 3 p. (Proceedings - 2021 36th IEEE/ACM International Conference on Automated Software Engineering, ASE 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Scopus citations
  • Detecting Kernel Memory Leaks in Specialized Modules with Ownership Reasoning

    Emamdoost, N., Wu, Q., Lu, K. & McCamant, S., 2021, 28th Annual Network and Distributed System Security Symposium, NDSS 2021. The Internet Society, (28th Annual Network and Distributed System Security Symposium, NDSS 2021).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    18 Scopus citations
  • Understanding and detecting disordered error handling with precise function pairing

    Wu, Q., Pakki, A., Emamdoost, N., McCamant, S. & Lu, K., 2021, Proceedings of the 30th USENIX Security Symposium. USENIX Association, p. 2041-2058 18 p. (Proceedings of the 30th USENIX Security Symposium).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Scopus citations
  • 2020

    Efficient and scalable cross-ISA virtualization of hardware transactional memory

    Wang, W., Yew, P. C., Zhai, A. & McCamant, S., Feb 22 2020, CGO 2020 - Proceedings of the 18th ACM/IEEE International Symposium on Code Generation and Optimization. Mars, J., Tang, L., Xue, J. & Wu, P. (eds.). Association for Computing Machinery, Inc, p. 107-120 14 p. (CGO 2020 - Proceedings of the 18th ACM/IEEE International Symposium on Code Generation and Optimization).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    9 Scopus citations
  • First Time Miss: Low Overhead Mitigation for Shared Memory Cache Side Channels

    Ramkrishnan, K., McCamant, S., Yew, P. C. & Zhai, A., Aug 17 2020, Proceedings of the 49th International Conference on Parallel Processing, ICPP 2020. Association for Computing Machinery, 3404434. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Scopus citations
  • Java Ranger: Statically summarizing regions for efficient symbolic execution of Java

    Sharma, V., Hussein, S., Whalen, M. W., McCamant, S. & Visser, W., Nov 8 2020, ESEC/FSE 2020 - Proceedings of the 28th ACM Joint Meeting European Software Engineering Conference and Symposium on the Foundations of Software Engineering. Devanbu, P., Cohen, M. & Zimmermann, T. (eds.). Association for Computing Machinery, Inc, p. 123-134 12 p. (ESEC/FSE 2020 - Proceedings of the 28th ACM Joint Meeting European Software Engineering Conference and Symposium on the Foundations of Software Engineering).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    17 Scopus citations
  • Java Ranger at SV-COMP 2020 (Competition Contribution)

    Sharma, V., Hussein, S., Whalen, M. W., McCamant, S. & Visser, W., 2020, Tools and Algorithms for the Construction and Analysis of Systems- 26th International Conference, TACAS 2020, held as part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2020, Proceedings, Part II. Biere, A. & Parker, D. (eds.). Springer, p. 393-397 5 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12079 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    10 Scopus citations
  • Precisely Characterizing Security Impact in a Flood of Patches via Symbolic Rule Comparison

    Wu, Q., He, Y., McCamant, S. & Lu, K., 2020, 27th Annual Network and Distributed System Security Symposium, NDSS 2020. The Internet Society, (27th Annual Network and Distributed System Security Symposium, NDSS 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    30 Scopus citations
  • 2019

    Cloud terminal: Secure access to sensitive applications from untrusted systems

    Martignoni, L., Poosankam, P., Zaharia, M., Han, J., McCamant, S., Song, D., Paxson, V., Perrig, A., Shenker, S. & Stoica, I., 2019, Proceedings of the 2012 USENIX Annual Technical Conference, USENIX ATC 2012. USENIX Association, p. 165-176 12 p. (Proceedings of the 2012 USENIX Annual Technical Conference, USENIX ATC 2012).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Scopus citations
  • Program-mandering: Quantitative privilege separation

    Liu, S., Zeng, D., McCamant, S., Huang, Y., Jaeger, T., Capobianco, F. & Tan, G., Nov 6 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1023-1040 18 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    19 Scopus citations
  • 2018

    Bit-vector model counting using statistical estimation

    Kim, S. & McCamant, S., 2018, Tools and Algorithms for the Construction and Analysis of Systems - 24th International Conference, TACAS 2018, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2018, Proceedings. Beyer, D. & Huisman, M. (eds.). Springer Verlag, p. 133-151 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10805 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Scopus citations
  • Contract discovery from black-box components

    Sharma, V., Byun, T., McCamant, S., Rayadurgam, S. & Heimdahl, M. P. E., Nov 9 2018, WASPI 2018 - Proceedings of the 1st ACM SIGSOFT International Workshop on Automated Specification Inference, Co-located with FSE 2018. Honavar, V., Nguyen, T. N., Leavens, G. T., Dyer, R., Rajan, H. & Nguyen, H. A. (eds.). Association for Computing Machinery, Inc, p. 5-8 4 p. (WASPI 2018 - Proceedings of the 1st ACM SIGSOFT International Workshop on Automated Specification Inference, Co-located with FSE 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Enhancing cross-ISA DBT through automatically learned translation rules

    Wang, W., McCamant, S. A., Zhai, A. B. & Yew, P.-C., Mar 19 2018, ASPLOS 2018 - 23rd International Conference on Architectural Support for Programming Languages and Operating Systems. 2 ed. Association for Computing Machinery, Vol. 53. p. 84-97 14 p. (ACM SIGPLAN Notices).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Scopus citations
  • Fast PokeEMU: Scaling generated instruction tests using aggregation and state chaining

    Yan, Q. & McCamant, S. A., Mar 25 2018, VEE 2018 - Proceedings of the 2018 International Conference on Virtual Execution Environments. 3 ed. Association for Computing Machinery, Inc, Vol. 53. p. 71-83 13 p. (VEE 2018 - Proceedings of the 2018 International Conference on Virtual Execution Environments).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    3 Scopus citations
  • Finding Substitutable Binary Code for Reverse Engineering by Synthesizing Adapters

    Sharma, V., Hietala, K. & McCamant, S., May 25 2018, Proceedings - 2018 IEEE 11th International Conference on Software Testing, Verification and Validation, ICST 2018. Institute of Electrical and Electronics Engineers Inc., p. 150-160 11 p. (Proceedings - 2018 IEEE 11th International Conference on Software Testing, Verification and Validation, ICST 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Scopus citations
  • 2017

    Discovering instructions for robust binary-level coverage criteria

    Sharma, V., Byun, T., McCamant, S., Rayadurgam, S. & Heimdahl, M. P. E., Jul 13 2017, TECPS 2017 - Proceedings of the 1st ACM SIGSOFT International Workshop on Testing Embedded and Cyber-Physical Systems, co-located with ISSTA 2017. Yu, T. & Marinov, D. (eds.). Association for Computing Machinery, Inc, p. 1-4 4 p. (TECPS 2017 - Proceedings of the 1st ACM SIGSOFT International Workshop on Testing Embedded and Cyber-Physical Systems, co-located with ISSTA 2017).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Scopus citations
  • Enabling cross-isa offloading for COTS binaries

    Wang, W., Yew, P. C., Zhai, A., McCamant, S., Wu, Y. & Bobba, J., Jun 16 2017, MobiSys 2017 - Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services. Association for Computing Machinery, Inc, p. 319-331 13 p. (MobiSys 2017 - Proceedings of the 15th Annual International Conference on Mobile Systems, Applications, and Services).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    24 Scopus citations
  • Toward Rigorous Object-Code Coverage Criteria

    Byun, T. J., Sharma, V. B., Rayadurgam, S., McCamant, S. A. & Heimdahl, M., Nov 14 2017, Proceedings - 2017 IEEE 28th International Symposium on Software Reliability Engineering, ISSRE 2017. IEEE Computer Society, p. 328-338 11 p. 8109098. (Proceedings - International Symposium on Software Reliability Engineering, ISSRE; vol. 2017-October).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    4 Scopus citations
  • 2016

    A general persistent code caching framework for dynamic binary translation (DBT)

    Wang, W., Yew, P. C., Zhai, A. & McCamant, S., 2016, Proceedings of the 2016 USENIX Annual Technical Conference, USENIX ATC 2016. USENIX Association, p. 591-603 13 p. (Proceedings of the 2016 USENIX Annual Technical Conference, USENIX ATC 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    27 Scopus citations
  • 2013

    HI-CFG: Construction by binary analysis and application to attack polymorphism

    Caselden, D., Bazhanyuk, A., Payer, M., McCamant, S. & Song, D., 2013, Computer Security, ESORICS 2013 - 18th European Symposium on Research in Computer Security, Proceedings. p. 164-181 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8134 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    29 Scopus citations
  • Practical control flow integrity and randomization for binary executables

    Zhang, C., Wei, T., Chen, Z., Duan, L., Szekeres, L., McCamant, S., Song, D. & Zou, W., 2013, Proceedings - 2013 IEEE Symposium on Security and Privacy, SP 2013. p. 559-573 15 p. 6547133. (Proceedings - IEEE Symposium on Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    412 Scopus citations
  • Protecting function pointers in binary

    Zhang, C., Wei, T., Chen, Z., Duan, L., McCamant, S. & Szekeres, L., 2013, ASIA CCS 2013 - Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security. p. 487-492 6 p. (ASIA CCS 2013 - Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Scopus citations
  • 2012

    Path-exploration lifting: Hi-fi tests for lo-fi emulators

    Martignoni, L., McCamant, S., Poosankam, P., Song, D. & Maniatis, P., 2012, ASPLOS XVII - 17th International Conference on Architectural Support for Programming Languages and Operating Systems. p. 337-348 12 p. (International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    70 Scopus citations
  • 2011

    Differential slicing: Identifying causal execution differences for security applications

    Johnson, N. M., Juan, C., Chen, K. Z., McCamant, S., Poosankam, P., Reynaud, D. & Song, D., 2011, Proceedings - 2011 IEEE Symposium on Security and Privacy, SP 2011. Institute of Electrical and Electronics Engineers Inc., p. 347-362 16 p. 5958039. (Proceedings - IEEE Symposium on Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    53 Scopus citations
  • Statically-directed dynamic automated test generation

    Babić, D., Martignoni, L., McCamant, S. & Song, D., 2011, 2011 International Symposium on Software Testing and Analysis, ISSTA 2011 - Proceedings. p. 12-22 11 p. (2011 International Symposium on Software Testing and Analysis, ISSTA 2011 - Proceedings).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    104 Scopus citations
  • 2010

    A symbolic execution framework for JavaScript

    Saxena, P., Akhawe, D., Hanna, S., Mao, F., McCamant, S. & Song, D., 2010, 2010 IEEE Symposium on Security and Privacy, SP 2010 - Proceedings. p. 513-528 16 p. 5504700. (Proceedings - IEEE Symposium on Security and Privacy).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    335 Scopus citations
  • Input generation via decomposition and re-stitching: Finding bugs in malware

    Caballero, J., Poosankam, P., McCamant, S., Babić, D. & Song, D., 2010, CCS'10 - Proceedings of the 17th ACM Conference on Computer and Communications Security. p. 413-425 13 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    46 Scopus citations
  • 2009

    Emulating emulation-resistant malware

    Kang, M. G., Yin, H., Hanna, S., McCamant, S. & Song, D., 2009, Proceedings of the 1st ACM Workshop on Virtual Machine Security, VMSec '09, Co-located with the 16th ACM Computer and Communications Security Conference, CCS'09. p. 11-22 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    69 Scopus citations
  • Loop-extended symbolic execution on binary programs

    Saxena, P., Poosankam, P., McCamant, S. & Song, D., Jul 19 2009, Proceedings of the 18th International Symposium on Software Testing and Analysis, ISSTA 2009. Association for Computing Machinery, Inc, p. 225-235 11 p. (Proceedings of the 18th International Symposium on Software Testing and Analysis, ISSTA 2009).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    137 Scopus citations
  • Measuring channel capacity to distinguish undue influence

    Newsome, J., Mccamant, S. & Song, D., 2009, PLAS'09 - Proceedings of the ACM SIGPLAN 4th Workshop on Programming Languages and Analysis for Security. p. 73-85 13 p. (PLAS'09 - Proceedings of the ACM SIGPLAN 4th Workshop on Programming Languages and Analysis for Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    69 Scopus citations
  • 2008

    Quantitative information flow as network flow capacity

    McCamant, S. & Ernst, M. D., 2008, PLDI'08: Proceedings of the 2008 SIGPLAN Conference on Programming Language Design and Implementation. p. 193-205 13 p. (Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    97 Scopus citations
  • 2007

    A simulation-based proof technique for dynamic information flow

    McCamant, S. & Ernst, M. D., 2007, PLAS'07 - Proceedings of the 2007 ACM SIGPLAN Workshop on Programming Languages and Analysis for Security. p. 41-46 6 p. (PLAS'07 - Proceedings of the 2007 ACM SIGPLAN Workshop on Programming Languages and Analysis for Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    17 Scopus citations
  • 2006

    Dynamic inference of abstract types

    Guo, P. J., Perkins, J. H., McCamant, S. & Ernst, M. D., 2006, Proceedings of the 2006 International Symposium on Software Testing and Analysis, ISSTA 2006. p. 255-265 11 p. (Proceedings of the 2006 International Symposium on Software Testing and Analysis, ISSTA 2006; vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    53 Scopus citations
  • Inference and enforcement of data structure consistency specifications

    Demsky, B., Ernst, M. D., Guo, P. J., McCamant, S., Perkins, J. H. & Rinard, M., 2006, Proceedings of the 2006 International Symposium on Software Testing and Analysis, ISSTA 2006. p. 233-243 11 p. (Proceedings of the 2006 International Symposium on Software Testing and Analysis, ISSTA 2006; vol. 2006).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    93 Scopus citations
  • 2003

    Predicting Problems Caused by Component Upgrades

    McCamant, S. & Ernst, M. D., 2003, Proceedings of the Joint European Software Engineering Conference (ESEC) and SIGSOFT Symposium on the Foundations of Software Engineering (FSE-11). Association for Computing Machinery (ACM), p. 287-296 10 p. (Proceedings of the Joint European Software Engineering Conference (ESEC) and SIGSOFT Symposium on the Foundations of Software Engineering (FSE-11)).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    39 Scopus citations