2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 2019
DOI: 10.1109/dsn.2019.00066
|View full text |Cite
|
Sign up to set email alerts
|

1dVul: Discovering 1-Day Vulnerabilities through Binary Patches

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
30
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 19 publications
(30 citation statements)
references
References 19 publications
0
30
0
Order By: Relevance
“…We use precision, recall, F-1 score, and accuracy to measure the accuracy of P1OVD. The four evaluation metrics are defined in Equation (1). P1OVD first generates signatures based on O0 optimization and x86_64 architecture and then scans the target binaries with the signatures.…”
Section: Accuracymentioning
confidence: 99%
See 1 more Smart Citation
“…We use precision, recall, F-1 score, and accuracy to measure the accuracy of P1OVD. The four evaluation metrics are defined in Equation (1). P1OVD first generates signatures based on O0 optimization and x86_64 architecture and then scans the target binaries with the signatures.…”
Section: Accuracymentioning
confidence: 99%
“…Vulnerabilities acknowledged by vendors are called 1-day vulnerabilities and are often fixed by upstream software developers using security patches [1]. In the past decades, 1-day vulnerabilities are widely spread among cyber-physical devices due to the popularity of open-source software cloning [2].…”
Section: Introductionmentioning
confidence: 99%
“…Digfuzz [21] proposed a probabilistic path prioritization model to estimate the probability of exercising each path and prioritized them for concolic execution. Peng et al [22] leveraged a distance-based directed fuzzing and a dominator-based directed symbolic execution mechanism to discover 1-day vulnerabilities in binary patches. SAVIOR [23] prioritized the concolic execution of the seeds which can uncover more vulnerabilities.…”
Section: Seed Mutationmentioning
confidence: 99%
“…A new approach to boost the efficacy of a directed testinput generation was proposed by 1dVul [100]. It utilizes "a distance-based directed fuzzing", and "dominator-based directed SE" systems [100]. Using binary patches, 1dVul detects one-day software vulnerabilities.…”
Section: ) Mutation-based Hybrid Fuzzersmentioning
confidence: 99%
“…MEUZZ [96] KLUZZER [84] LibKluzzer [86] Map2Check [88] KleeFL [90] Berry [98] BugMiner [146] DrillerGo [99] 1dVul [100] FFUZ [101] Breacher [108] S2F [136] Angora [120] Pangolin [139] Driller [6] DeepFuzz [135] Zhang et. al.…”
Section: Hfs In Various Areasmentioning
confidence: 99%