Chaofan Shou

ORCID: 0000-0003-2428-3044
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • Security and Verification in Computing
  • Adversarial Robustness in Machine Learning
  • Software Testing and Debugging Techniques
  • Web Application Security Vulnerabilities
  • Software-Defined Networks and 5G
  • Software Engineering Research
  • Blockchain Technology Applications and Security
  • Internet Traffic Analysis and Secure E-voting
  • Software Reliability and Analysis Research
  • Insurance and Financial Risk Management
  • FinTech, Crowdfunding, Digital Finance
  • Software System Performance and Reliability
  • Spam and Phishing Detection
  • Network Security and Intrusion Detection
  • Network Traffic and Congestion Control
  • Network Packet Processing and Optimization

University of California, Berkeley
2023-2024

Berkeley College
2024

University of California, Santa Barbara
2021-2023

Smart contracts are critical financial instruments, and their security is of utmost importance. However, smart contract programs difficult to fuzz due the persistent blockchain state behind all transactions. Mutating sequences transactions complex often lead a suboptimal exploration for both input program spaces. In this paper, we introduce novel snapshot-based fuzzer ItyFuzz testing contracts. ItyFuzz, instead storing mutating from them, snapshot states singleton To explore interesting...

10.1145/3597926.3598059 article EN 2023-07-12

As blockchain platforms grow exponentially, millions of lines smart contract code are being deployed to manage extensive digital assets. However, vulnerabilities in this mission-critical have led significant exploitations and asset losses. Thorough automated security analysis contracts is thus imperative. This paper introduces LLM4Fuzz optimize by leveraging large language models (LLMs) intelligently guide prioritize fuzzing campaigns. While traditional suffers from low efficiency exploring...

10.48550/arxiv.2401.11108 preprint EN cc-by arXiv (Cornell University) 2024-01-01

Network telemetry systems have become hybrid combinations of state-of-the-art stream processors and modern programmable data-plane devices. However, the existing designs such not focused on ensuring that these are also deployable in practice, i.e., able to scale deal with dynamics real-world traffic query workloads. Unfortunately, efforts hampered by severe constraints available compute resources data plane (e.g., memory, ALUs). Similarly, limited runtime programmability hardware targets...

10.1145/3649471 article EN cc-by Proceedings of the ACM on Networking 2024-03-28

Starting with a random initial seed, fuzzers search for inputs that trigger bugs or vulnerabilities. However, often fail to generate program paths guarded by restrictive branch conditions. In this paper, we show first identifying rare-paths in programs (i.e., path constraints are unlikely be satisfied input generation), and then, generating inputs/seeds rare-paths, one can improve the coverage of fuzzing tools. particular, present techniques 1) identify rare using quantitative symbolic...

10.1145/3597926.3598136 article EN 2023-07-12

Browsers use security policies to block malicious behaviors. Cross-Origin Read Blocking (CORB) is a browser policy for preventing side-channel attacks such as Spectre. We propose web fuzzer called CorbFuzz checking CORB and similar policies. In implementing policy, the only has access HTTP requests responses, takes actions based solely on those interactions. policies, uses oracle that tracks application behavior infers desired action state. By comparing with behavior, detects weaknesses in...

10.1109/ase51524.2021.9678636 article EN 2021 36th IEEE/ACM International Conference on Automated Software Engineering (ASE) 2021-11-01

Billions of dollars have been lost due to vulnerabilities in smart contracts. To counteract this, researchers proposed attack frontrunning protections designed preempt malicious transactions by inserting "whitehat" ahead them protect the assets. In this paper, we demonstrate that existing become ineffective real-world scenarios. Specifically, collected 158 recent and discovered 141 can bypass state-of-the-art protections. We systematically analyze these attacks show how inherent limitations...

10.48550/arxiv.2409.06213 preprint EN arXiv (Cornell University) 2024-09-10

In recent years, the growth of mobile advertising has been driven by in-app programmatic and technologies like Real-Time Bidding (RTB). However, this also led to an increase in ad fraud, such as click injection, background activity, etc. While existing studies have primarily concentrated on fraud within individual apps or devices, paper introduces a new form collusion-based named attribution laundering (ALF). ALF involves multiple collaborating deceive advertisers misrepresenting app where...

10.1145/3658644.3670314 article EN 2024-12-02

This paper proposes a state-aware fuzzing framework for testing software-defined network applications. It leverages property graph to store results. Application developers can easily express oracles with the query language test their The representation also allows analyze result efficiently.

10.1145/3468264.3473487 article EN 2021-08-18

Browsers use security policies to block malicious behaviors. Cross-Origin Read Blocking (CORB) is a browser policy for preventing side-channel attacks such as Spectre. We propose web fuzzer called CorbFuzz checking CORB and similar policies. In implementing policy, the only has access HTTP requests responses, takes actions based solely on those interactions. policies, uses oracle that tracks application behavior infers desired action state. By comparing with behavior, detects weaknesses in...

10.48550/arxiv.2109.00398 preprint EN cc-by arXiv (Cornell University) 2021-01-01

Smart contracts are critical financial instruments, and their security is of utmost importance. However, smart contract programs difficult to fuzz due the persistent blockchain state behind all transactions. Mutating sequences transactions complex often lead a suboptimal exploration for both input program spaces. In this paper, we introduce novel snapshot-based fuzzer ItyFuzz testing contracts. ItyFuzz, instead storing mutating from them, snapshot states singleton To explore interesting...

10.48550/arxiv.2306.17135 preprint EN cc-by arXiv (Cornell University) 2023-01-01

Starting with a random initial seed, fuzzers search for inputs that trigger bugs or vulnerabilities. However, often fail to generate program paths guarded by restrictive branch conditions. In this paper, we show first identifying rare-paths in programs (i.e., path constraints are unlikely be satisfied input generation), and then, generating inputs/seeds rare-paths, one can improve the coverage of fuzzing tools. particular, present techniques 1) identify rare using quantitative symbolic...

10.48550/arxiv.2212.09004 preprint EN cc-by arXiv (Cornell University) 2022-01-01

In this paper we present techniques for generating targeted mitigation strategies network side-channel vulnerabilities in IoT applications. Our tool IoTPatch profiles the target application by capturing traffic and labeling traces with corresponding user actions. It extracts features such as packet sizes times from captured traces, quantifies information leakage modeling distribution of feature values. order to mitigate vulnerabilities, uses measure over prioritize specific synthesizes a...

10.1145/3567445.3567447 article EN cc-by 2022-11-07
Coming Soon ...