(Translated by https://www.hiragana.jp/)
Search | arXiv e-print repository
Skip to main content

Showing 1–14 of 14 results for author: Kirda, E

Searching in archive cs. Search in all archives.
.
  1. arXiv:2402.09233  [pdf, other

    cs.RO cs.AI cs.MA eess.SY math.OC

    Design and Realization of a Benchmarking Testbed for Evaluating Autonomous Platooning Algorithms

    Authors: Michael Shaham, Risha Ranjan, Engin Kirda, Taskin Padir

    Abstract: Autonomous vehicle platoons present near- and long-term opportunities to enhance operational efficiencies and save lives. The past 30 years have seen rapid development in the autonomous driving space, enabling new technologies that will alleviate the strain placed on human drivers and reduce vehicle emissions. This paper introduces a testbed for evaluating and benchmarking platooning algorithms on… ▽ More

    Submitted 14 February, 2024; originally announced February 2024.

    Comments: To be published in International Symposium on Experimental Robotics, 2023

  2. arXiv:2312.01195  [pdf, other

    cs.CR cs.SE

    AIM: Automatic Interrupt Modeling for Dynamic Firmware Analysis

    Authors: Bo Feng, Meng Luo, Changming Liu, Long Lu, Engin Kirda

    Abstract: The security of microcontrollers, which drive modern IoT and embedded devices, continues to raise major concerns. Within a microcontroller (MCU), the firmware is a monolithic piece of software that contains the whole software stack, whereas a variety of peripherals represent the hardware. As MCU firmware contains vulnerabilities, it is ideal to test firmware with off-the-shelf software testing tec… ▽ More

    Submitted 2 December, 2023; originally announced December 2023.

    Comments: This paper was accepted to IEEE Transactions on Dependable and Secure Computing at Oct 12, 2023

  3. arXiv:2211.03015  [pdf, other

    cs.CR

    Experience Report on the Challenges and Opportunities in Securing Smartphones Against Zero-Click Attacks

    Authors: Narmeen Shafqat, Cem Topcuoglu, Engin Kirda, Aanjhan Ranganathan

    Abstract: Zero-click attacks require no user interaction and typically exploit zero-day (i.e., unpatched) vulnerabilities in instant chat applications (such as WhatsApp and iMessage) to gain root access to the victim's smartphone and exfiltrate sensitive data. In this paper, we report our experiences in attempting to secure smartphones against zero-click attacks. We approached the problem by first enumerati… ▽ More

    Submitted 5 November, 2022; originally announced November 2022.

  4. D-Box: DMA-enabled Compartmentalization for Embedded Applications

    Authors: Alejandro Mera, Yi Hui Chen, Ruimin Sun, Engin Kirda, Long Lu

    Abstract: Embedded and Internet-of-Things (IoT) devices have seen an increase in adoption in many domains. The security of these devices is of great importance as they are often used to control critical infrastructure, medical devices, and vehicles. Existing solutions to isolate microcontroller (MCU) resources in order to increase their security face significant challenges such as specific hardware unavaila… ▽ More

    Submitted 13 January, 2022; originally announced January 2022.

    Comments: Network and Distributed Systems Security (NDSS) Symposium 2022

  5. arXiv:2103.03851  [pdf, other

    cs.CR

    SoK: Cryptojacking Malware

    Authors: Ege Tekiner, Abbas Acar, A. Selcuk Uluagac, Engin Kirda, Ali Aydin Selcuk

    Abstract: Emerging blockchain and cryptocurrency-based technologies are redefining the way we conduct business in cyberspace. Today, a myriad of blockchain and cryptocurrency systems, applications, and technologies are widely available to companies, end-users, and even malicious actors who want to exploit the computational resources of regular users through \textit{cryptojacking} malware. Especially with re… ▽ More

    Submitted 26 April, 2021; v1 submitted 5 March, 2021; originally announced March 2021.

    Comments: EuroS&P 2021 Conference

  6. arXiv:2007.01502  [pdf, other

    cs.CR

    DICE: Automatic Emulation of DMA Input Channels for Dynamic Firmware Analysis

    Authors: Alejandro Mera, Bo Feng, Long Lu, Engin Kirda

    Abstract: Microcontroller-based embedded devices are at the core of Internet-of-Things and Cyber-Physical Systems. The security of these devices is of paramount importance. Among the approaches to securing embedded devices, dynamic firmware analysis gained great attention lately, thanks to its offline nature and low false-positive rates. However, regardless of the analysis and emulation techniques used, exi… ▽ More

    Submitted 14 January, 2021; v1 submitted 3 July, 2020; originally announced July 2020.

    Journal ref: 42nd IEEE Symposium on Security and Privacy, S&P 2021

  7. arXiv:2003.05503  [pdf, other

    cs.CR

    Bypassing memory safety mechanisms through speculative control flow hijacks

    Authors: Andrea Mambretti, Alexandra Sandulescu, Alessandro Sorniotti, William Robertson, Engin Kirda, Anil Kurmus

    Abstract: The prevalence of memory corruption bugs in the past decades resulted in numerous defenses, such as stack canaries, control flow integrity (CFI), and memory safe languages. These defenses can prevent entire classes of vulnerabilities, and help increase the security posture of a program. In this paper, we show that memory corruption defenses can be bypassed using speculative execution attacks. We s… ▽ More

    Submitted 19 April, 2021; v1 submitted 11 March, 2020; originally announced March 2020.

    Comments: To appear at IEEE EuroS&P 2021 (https://www.ieee-security.org/TC/EuroSP2021/)

  8. HotFuzz: Discovering Algorithmic Denial-of-Service Vulnerabilities Through Guided Micro-Fuzzing

    Authors: William Blair, Andrea Mambretti, Sajjad Arshad, Michael Weissbacher, William Robertson, Engin Kirda, Manuel Egele

    Abstract: Contemporary fuzz testing techniques focus on identifying memory corruption vulnerabilities that allow adversaries to achieve either remote code execution or information disclosure. Meanwhile, Algorithmic Complexity (AC)vulnerabilities, which are a common attack vector for denial-of-service attacks, remain an understudied threat. In this paper, we present HotFuzz, a framework for automatically dis… ▽ More

    Submitted 14 February, 2020; v1 submitted 9 February, 2020; originally announced February 2020.

    Comments: Network and Distributed Systems Security (NDSS) Symposium, San Diego, CA, USA, February 2020

  9. arXiv:1912.10190  [pdf, other

    cs.CR

    Cached and Confused: Web Cache Deception in the Wild

    Authors: Seyed Ali Mirheidari, Sajjad Arshad, Kaan Onarlioglu, Bruno Crispo, Engin Kirda, William Robertson

    Abstract: Web cache deception (WCD) is an attack proposed in 2017, where an attacker tricks a caching proxy into erroneously storing private information transmitted over the Internet and subsequently gains unauthorized access to that cached data. Due to the widespread use of web caches and, in particular, the use of massive networks of caching proxies deployed by content distribution network (CDN) providers… ▽ More

    Submitted 13 February, 2020; v1 submitted 20 December, 2019; originally announced December 2019.

    Comments: USENIX Security Symposium, Boston, MA, USA, August 2020

  10. arXiv:1911.10186  [pdf, other

    cs.CR

    KRATOS: Multi-User Multi-Device-Aware Access Control System for the Smart Home

    Authors: Amit Kumar Sikder, Leonardo Babun, Z. Berkay Celik, Abbas Acar, Hidayet Aksu, Patrick McDaniel, Engin Kirda, A. Selcuk Uluagac

    Abstract: In a smart home system, multiple users have access to multiple devices, typically through a dedicated app installed on a mobile device. Traditional access control mechanisms consider one unique trusted user that controls the access to the devices. However, multi-user multi-device smart home settings pose fundamentally different challenges to traditional single-user systems. For instance, in a mult… ▽ More

    Submitted 2 June, 2020; v1 submitted 22 November, 2019; originally announced November 2019.

    Comments: Accepted in the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks (ACM WiSec 2020)

  11. arXiv:1910.00508  [pdf, ps, other

    cs.CR

    An Analysis of Malware Trends in Enterprise Networks

    Authors: Abbas Acar, Long Lu, A. Selcuk Uluagac, Engin Kirda

    Abstract: We present an empirical and large-scale analysis of malware samples captured from two different enterprises from 2017 to early 2018. Particularly, we perform threat vector, social-engineering, vulnerability and time-series analysis on our dataset. Unlike existing malware studies, our analysis is specifically focused on the recent enterprise malware samples. First of all, based on our analysis on t… ▽ More

    Submitted 1 October, 2019; originally announced October 2019.

  12. Thou Shalt Not Depend on Me: Analysing the Use of Outdated JavaScript Libraries on the Web

    Authors: Tobias Lauinger, Abdelberi Chaabane, Sajjad Arshad, William Robertson, Christo Wilson, Engin Kirda

    Abstract: Web developers routinely rely on third-party Java-Script libraries such as jQuery to enhance the functionality of their sites. However, if not properly maintained, such dependencies can create attack vectors allowing a site to be compromised. In this paper, we conduct the first comprehensive study of client-side JavaScript library usage and the resulting security implications across the Web. Usi… ▽ More

    Submitted 13 February, 2020; v1 submitted 2 November, 2018; originally announced November 2018.

    Comments: Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, February 2017

  13. Large-Scale Analysis of Style Injection by Relative Path Overwrite

    Authors: Sajjad Arshad, Seyed Ali Mirheidari, Tobias Lauinger, Bruno Crispo, Engin Kirda, William Robertson

    Abstract: Relative Path Overwrite (RPO) is a recent technique to inject style directives into sites even when no style sink or markup injection vulnerability is present. It exploits differences in how browsers and web servers interpret relative paths (i.e., path confusion) to make a HTML page reference itself as a stylesheet; a simple text injection vulnerability along with browsers' leniency in parsing CSS… ▽ More

    Submitted 13 February, 2020; v1 submitted 2 November, 2018; originally announced November 2018.

    Comments: The Web Conference (WWW), Lyon, France, April 2018

  14. arXiv:1810.10649  [pdf, other

    cs.CR

    On the Effectiveness of Type-based Control Flow Integrity

    Authors: Reza Mirzazade Farkhani, Saman Jafari, Sajjad Arshad, William Robertson, Engin Kirda, Hamed Okhravi

    Abstract: Control flow integrity (CFI) has received significant attention in the community to combat control hijacking attacks in the presence of memory corruption vulnerabilities. The challenges in creating a practical CFI has resulted in the development of a new type of CFI based on runtime type checking (RTC). RTC-based CFI has been implemented in a number of recent practical efforts such as GRSecurity R… ▽ More

    Submitted 13 February, 2020; v1 submitted 24 October, 2018; originally announced October 2018.

    Comments: Annual Computer Security Applications Conference (ACSAC), San Juan, Puerto Rico, USA, December 2018