Zum Hauptinhalt springen

Showing 1–3 of 3 results for author: Bernhard, L

Searching in archive cs. Search in all archives.
.
  1. SoK: Prudent Evaluation Practices for Fuzzing

    Authors: Moritz Schloegel, Nils Bars, Nico Schiller, Lukas Bernhard, Tobias Scharnowski, Addison Crump, Arash Ale Ebrahim, Nicolai Bissantz, Marius Muench, Thorsten Holz

    Abstract: Fuzzing has proven to be a highly effective approach to uncover software bugs over the past decade. After AFL popularized the groundbreaking concept of lightweight coverage feedback, the field of fuzzing has seen a vast amount of scientific work proposing new techniques, improving methodological aspects of existing strategies, or porting existing methods to new domains. All such work must demonstr… ▽ More

    Submitted 16 May, 2024; originally announced May 2024.

  2. arXiv:2304.06341  [pdf, other

    cs.CR

    EF/CF: High Performance Smart Contract Fuzzing for Exploit Generation

    Authors: Michael Rodler, David Paaßen, Wenting Li, Lukas Bernhard, Thorsten Holz, Ghassan Karame, Lucas Davi

    Abstract: Smart contracts are increasingly being used to manage large numbers of high-value cryptocurrency accounts. There is a strong demand for automated, efficient, and comprehensive methods to detect security vulnerabilities in a given contract. While the literature features a plethora of analysis methods for smart contracts, the existing proposals do not address the increasing complexity of contracts.… ▽ More

    Submitted 13 April, 2023; originally announced April 2023.

    Comments: To be published at Euro S&P 2023

  3. arXiv:2203.04117  [pdf, other

    cs.CR

    xTag: Mitigating Use-After-Free Vulnerabilities via Software-Based Pointer Tagging on Intel x86-64

    Authors: Lukas Bernhard, Michael Rodler, Thorsten Holz, Lucas Davi

    Abstract: Memory safety in complex applications implemented in unsafe programming languages such as C/C++ is still an unresolved problem in practice. Many different types of defenses have been proposed in the past to mitigate this problem. The most promising next step is a tighter integration of the hardware and software level: modern mitigation techniques are either accelerated using hardware extensions or… ▽ More

    Submitted 8 March, 2022; originally announced March 2022.