Annual Computer Security Applications Conference 2020
DOI: 10.1145/3427228.3427269
|View full text |Cite
|
Sign up to set email alerts
|

A Flexible Framework for Expediting Bug Finding by Leveraging Past (Mis-)Behavior to Discover New Bugs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 26 publications
0
3
0
Order By: Relevance
“…If the queue is in the NORMAL or FULL state, the operation shall return the first available element (line 10). An additional CAS is used to mark the element as consumed by updating the head index (lines [11][12][13]. Similarly to the discussion on Algorithm 1, relying on a CAS operation on IDX ensures that if a writer has changed the queue state concurrently to the read, the reader is forced to observe again the updated state thanks to the CAS failure.…”
Section: F I G U R Ementioning
confidence: 99%
See 1 more Smart Citation
“…If the queue is in the NORMAL or FULL state, the operation shall return the first available element (line 10). An additional CAS is used to mark the element as consumed by updating the head index (lines [11][12][13]. Similarly to the discussion on Algorithm 1, relying on a CAS operation on IDX ensures that if a writer has changed the queue state concurrently to the read, the reader is forced to observe again the updated state thanks to the CAS failure.…”
Section: F I G U R Ementioning
confidence: 99%
“…In this scenario, the capability to effectively monitor the behavior of applications using non‐intrusive facilities enables new applications of the autonomic computing paradigm 7,8 . In this direction, HPCs have been used in a myriad of applications, such as dynamic software profiling, 9 CPU power modeling, 2 children privacy protection, 10 failure prediction in computing systems, 11 random number generators, 12 or for the generation of test programs via fuzzing to enhance code coverage 13 just to mention a few diverse applications.…”
Section: Introductionmentioning
confidence: 99%
“…Further considerations for user permission details [34], hardware performance counters [35] or behaviour logs analysis [36] is beyond the scope of this work. Since some network sites do not maintain incident reports [37] or collect detailed security logs and others may not release the data due to restrictions in their distribution policies [22], this makes our statistical inference difficult to confirm.…”
Section: Threats To Validitymentioning
confidence: 99%