Share This Author
Finding Security Vulnerabilities in Java Applications with Static Analysis
This paper proposes a static analysis technique for detecting many recently discovered application vulnerabilities such as SQL injections, cross-site scripting, and HTTP splitting attacks based on a scalable and precise points-to analysis.
Finding application errors and security flaws using PQL: a program query language
This paper presents a language called PQL (Program Query Language) that allows programmers to express such questions easily in an application-specific context and develops both static and dynamic techniques to find solutions to PQL queries.
- Charlie Curtsinger, B. Livshits, B. Zorn, C. Seifert
- Computer ScienceUSENIX Security Symposium
- 8 August 2011
DynaMine: finding common error patterns by mining software revision histories
The combination of revision history mining and dynamic analysis techniques leveraged in DynaMine proves effective for both discovering new application-specific patterns and for finding errors when applied to very large applications with many man-years of development and debugging effort behind them.
NOZZLE: A Defense Against Heap-spraying Code Injection Attacks
The effectiveness of NOZZLE is measured by demonstrating that it successfully detects 12 published and 2,000 synthetically generated heap-spraying exploits and it is shown that even with a detection threshold set six times lower than is required to detect published malicious attacks, NOZZle reports no false positives when run over 150 popular Internet sites.
ConScript, a client-side advice implementation for security, built on top of Internet Explorer 8, is presented and it is concluded that it is significantly lower than that of other systems proposed in the literature, both on micro-benchmarks as well as large, widely-used applications such as MSN, GMail, Google Maps, and Live Desktop.
GATEKEEPER is a highly extensible system with a rich, expressive policy language, allowing the hosting site administrator to formulate their policies as succinct Datalog queries, and results in 1,341 verified warnings in 684 widgets, no false negatives, due to the soundness of the analysis, and false positives affecting only two widgets.
Rozzle: De-cloaking Internet Malware
- Clemens Kolbitsch, B. Livshits, B. Zorn, C. Seifert
- Computer ScienceIEEE Symposium on Security and Privacy
- 20 May 2012
- C. Fournet, N. Swamy, Juan Chen, Pierre-Évariste Dagand, Pierre-Yves Strub, B. Livshits
- Computer SciencePOPL
- 23 January 2013