- Advanced Malware Detection Techniques
- Security and Verification in Computing
- Adversarial Robustness in Machine Learning
- Software Testing and Debugging Techniques
- Web Application Security Vulnerabilities
- Software-Defined Networks and 5G
- Software Engineering Research
- Blockchain Technology Applications and Security
- Internet Traffic Analysis and Secure E-voting
- Software Reliability and Analysis Research
- Insurance and Financial Risk Management
- FinTech, Crowdfunding, Digital Finance
- Software System Performance and Reliability
- Spam and Phishing Detection
- Network Security and Intrusion Detection
- Network Traffic and Congestion Control
- Network Packet Processing and Optimization
University of California, Berkeley
2023-2024
Berkeley College
2024
University of California, Santa Barbara
2021-2023
Smart contracts are critical financial instruments, and their security is of utmost importance. However, smart contract programs difficult to fuzz due the persistent blockchain state behind all transactions. Mutating sequences transactions complex often lead a suboptimal exploration for both input program spaces. In this paper, we introduce novel snapshot-based fuzzer ItyFuzz testing contracts. ItyFuzz, instead storing mutating from them, snapshot states singleton To explore interesting...
As blockchain platforms grow exponentially, millions of lines smart contract code are being deployed to manage extensive digital assets. However, vulnerabilities in this mission-critical have led significant exploitations and asset losses. Thorough automated security analysis contracts is thus imperative. This paper introduces LLM4Fuzz optimize by leveraging large language models (LLMs) intelligently guide prioritize fuzzing campaigns. While traditional suffers from low efficiency exploring...
Network telemetry systems have become hybrid combinations of state-of-the-art stream processors and modern programmable data-plane devices. However, the existing designs such not focused on ensuring that these are also deployable in practice, i.e., able to scale deal with dynamics real-world traffic query workloads. Unfortunately, efforts hampered by severe constraints available compute resources data plane (e.g., memory, ALUs). Similarly, limited runtime programmability hardware targets...
Starting with a random initial seed, fuzzers search for inputs that trigger bugs or vulnerabilities. However, often fail to generate program paths guarded by restrictive branch conditions. In this paper, we show first identifying rare-paths in programs (i.e., path constraints are unlikely be satisfied input generation), and then, generating inputs/seeds rare-paths, one can improve the coverage of fuzzing tools. particular, present techniques 1) identify rare using quantitative symbolic...
Browsers use security policies to block malicious behaviors. Cross-Origin Read Blocking (CORB) is a browser policy for preventing side-channel attacks such as Spectre. We propose web fuzzer called CorbFuzz checking CORB and similar policies. In implementing policy, the only has access HTTP requests responses, takes actions based solely on those interactions. policies, uses oracle that tracks application behavior infers desired action state. By comparing with behavior, detects weaknesses in...
Billions of dollars have been lost due to vulnerabilities in smart contracts. To counteract this, researchers proposed attack frontrunning protections designed preempt malicious transactions by inserting "whitehat" ahead them protect the assets. In this paper, we demonstrate that existing become ineffective real-world scenarios. Specifically, collected 158 recent and discovered 141 can bypass state-of-the-art protections. We systematically analyze these attacks show how inherent limitations...
In recent years, the growth of mobile advertising has been driven by in-app programmatic and technologies like Real-Time Bidding (RTB). However, this also led to an increase in ad fraud, such as click injection, background activity, etc. While existing studies have primarily concentrated on fraud within individual apps or devices, paper introduces a new form collusion-based named attribution laundering (ALF). ALF involves multiple collaborating deceive advertisers misrepresenting app where...
This paper proposes a state-aware fuzzing framework for testing software-defined network applications. It leverages property graph to store results. Application developers can easily express oracles with the query language test their The representation also allows analyze result efficiently.
Browsers use security policies to block malicious behaviors. Cross-Origin Read Blocking (CORB) is a browser policy for preventing side-channel attacks such as Spectre. We propose web fuzzer called CorbFuzz checking CORB and similar policies. In implementing policy, the only has access HTTP requests responses, takes actions based solely on those interactions. policies, uses oracle that tracks application behavior infers desired action state. By comparing with behavior, detects weaknesses in...
Smart contracts are critical financial instruments, and their security is of utmost importance. However, smart contract programs difficult to fuzz due the persistent blockchain state behind all transactions. Mutating sequences transactions complex often lead a suboptimal exploration for both input program spaces. In this paper, we introduce novel snapshot-based fuzzer ItyFuzz testing contracts. ItyFuzz, instead storing mutating from them, snapshot states singleton To explore interesting...
Starting with a random initial seed, fuzzers search for inputs that trigger bugs or vulnerabilities. However, often fail to generate program paths guarded by restrictive branch conditions. In this paper, we show first identifying rare-paths in programs (i.e., path constraints are unlikely be satisfied input generation), and then, generating inputs/seeds rare-paths, one can improve the coverage of fuzzing tools. particular, present techniques 1) identify rare using quantitative symbolic...
In this paper we present techniques for generating targeted mitigation strategies network side-channel vulnerabilities in IoT applications. Our tool IoTPatch profiles the target application by capturing traffic and labeling traces with corresponding user actions. It extracts features such as packet sizes times from captured traces, quantifies information leakage modeling distribution of feature values. order to mitigate vulnerabilities, uses measure over prioritize specific synthesizes a...