179 research outputs found
JIGSAW: Efficient and Scalable Path Constraints Fuzzing
Coverage-guided testing has shown to be an effective way to find bugs. If we model coverage-guided testing as a search problem (i.e., finding inputs that can cover more branches), then its efficiency mainly depends on two factors: (1) the accuracy of the searching algorithm and (2) the number of inputs that can be evaluated per unit time. Therefore, improving the search throughput has shown to be an effective way to improve the performance of coverage-guided testing.In this work, we present a novel design to improve the search throughput: by evaluating newly generated inputs with JIT-compiled path constraints. This approach allows us to significantly improve the single thread throughput as well as scaling to multiple cores. We also developed several optimization techniques to eliminate major bottlenecks during this process. Evaluation of our prototype JIGSAW shows that our approach can achieve three orders of magnitude higher search throughput than existing fuzzers and can scale to multiple cores. We also find that with such high throughput, a simple gradient-guided search heuristic can solve path constraints collected from a large set of real-world programs faster than SMT solvers with much more sophisticated search heuristics. Evaluation of end-to-end coverage-guided testing also shows that our JIGSAW-powered hybrid fuzzer can outperform state-of-the-art testing tools
Emergence of Topologically Nontrivial Spin-Polarized States in a Segmented Linear Chain.
The synthesis of new materials with novel or useful properties is one of the most important drivers in the fields of condensed matter physics and materials science. Discoveries of this kind are especially significant when they point to promising future basic research and applications. van der Waals bonded materials comprised of lower-dimensional building blocks have been shown to exhibit emergent properties when isolated in an atomically thin form [1-8]. Here, we report the discovery of a transition metal chalcogenide in a heretofore unknown segmented linear chain form, where basic building blocks each consisting of two hafnium atoms and nine tellurium atoms (Hf_{2}Te_{9}) are van der Waals bonded end to end. First-principle calculations based on density functional theory reveal striking crystal-symmetry-related features in the electronic structure of the segmented chain, including giant spin splitting and nontrivial topological phases of selected energy band states. Atomic-resolution scanning transmission electron microscopy reveals single segmented Hf_{2}Te_{9} chains isolated within the hollow cores of carbon nanotubes, with a structure consistent with theoretical predictions. van der Waals bonded segmented linear chain transition metal chalcogenide materials could open up new opportunities in low-dimensional, gate-tunable, magnetic, and topological crystalline systems
Studying Malicious Websites and the Underground Economy on the Chinese Web
The World Wide Web gains more and more popularity within China with more than 1.31 million websites on the Chinese Web in June 2007. Driven by the economic profits, cyber criminals are on the rise and use the Web to exploit innocent users. In fact, a real underground black market with thousand of participants has developed which brings together malicious users who trade exploits, malware, virtual assets, stolen credentials, and more. In this paper, we provide a detailed overview of this underground black market and present a model to describe the market. We substantiate our model with the help of measurement results within the Chinese Web. First, we show that the amount of virtual assets traded on this underground market is huge. Second, our research proofs that a significant amount of websites within China’s part of the Web are malicious: our measurements reveal that about 1.49% of the examined sites contain some kind of malicious content
MsPrompt: Multi-step Prompt Learning for Debiasing Few-shot Event Detection
Event detection (ED) is aimed to identify the key trigger words in
unstructured text and predict the event types accordingly. Traditional ED
models are too data-hungry to accommodate real applications with scarce labeled
data. Besides, typical ED models are facing the context-bypassing and disabled
generalization issues caused by the trigger bias stemming from ED datasets.
Therefore, we focus on the true few-shot paradigm to satisfy the low-resource
scenarios. In particular, we propose a multi-step prompt learning model
(MsPrompt) for debiasing few-shot event detection, that consists of the
following three components: an under-sampling module targeting to construct a
novel training set that accommodates the true few-shot setting, a multi-step
prompt module equipped with a knowledge-enhanced ontology to leverage the event
semantics and latent prior knowledge in the PLMs sufficiently for tackling the
context-bypassing problem, and a prototypical module compensating for the
weakness of classifying events with sparse data and boost the generalization
performance. Experiments on two public datasets ACE-2005 and FewEvent show that
MsPrompt can outperform the state-of-the-art models, especially in the strict
low-resource scenarios reporting 11.43% improvement in terms of weighted
F1-score against the best-performing baseline and achieving an outstanding
debiasing performance
ret2spec: Speculative Execution Using Return Stack Buffers
Speculative execution is an optimization technique that has been part of CPUs
for over a decade. It predicts the outcome and target of branch instructions to
avoid stalling the execution pipeline. However, until recently, the security
implications of speculative code execution have not been studied.
In this paper, we investigate a special type of branch predictor that is
responsible for predicting return addresses. To the best of our knowledge, we
are the first to study return address predictors and their consequences for the
security of modern software. In our work, we show how return stack buffers
(RSBs), the core unit of return address predictors, can be used to trigger
misspeculations. Based on this knowledge, we propose two new attack variants
using RSBs that give attackers similar capabilities as the documented Spectre
attacks. We show how local attackers can gain arbitrary speculative code
execution across processes, e.g., to leak passwords another user enters on a
shared system. Our evaluation showed that the recent Spectre countermeasures
deployed in operating systems can also cover such RSB-based cross-process
attacks. Yet we then demonstrate that attackers can trigger misspeculation in
JIT environments in order to leak arbitrary memory content of browser
processes. Reading outside the sandboxed memory region with JIT-compiled code
is still possible with 80\% accuracy on average.Comment: Updating to the cam-ready version and adding reference to the
original pape
DiffTune: Auto-Tuning through Auto-Differentiation
The performance of robots in high-level tasks depends on the quality of their
lower-level controller, which requires fine-tuning. However, the intrinsically
nonlinear dynamics and controllers make tuning a challenging task when it is
done by hand. In this paper, we present DiffTune, a novel, gradient-based
automatic tuning framework. We formulate the controller tuning as a parameter
optimization problem. Our method unrolls the dynamical system and controller as
a computational graph and updates the controller parameters through
gradient-based optimization. The gradient is obtained using sensitivity
propagation, which is the only method for gradient computation when tuning for
a physical system instead of its simulated counterpart. Furthermore, we use
adaptive control to compensate for the uncertainties (that
unavoidably exist in a physical system) such that the gradient is not biased by
the unmodelled uncertainties. We validate the DiffTune on a Dubin's car and a
quadrotor in challenging simulation environments. In comparison with
state-of-the-art auto-tuning methods, DiffTune achieves the best performance in
a more efficient manner owing to its effective usage of the first-order
information of the system. Experiments on tuning a nonlinear controller for
quadrotor show promising results, where DiffTune achieves 3.5x tracking error
reduction on an aggressive trajectory in only 10 trials over a 12-dimensional
controller parameter space.Comment: Minkyung Kim and Lin Song contributed equally to this wor
- …