155 research outputs found
A General Static Binary Rewriting Framework for WebAssembly
Binary rewriting is a widely adopted technique in software analysis.
WebAssembly (Wasm), as an emerging bytecode format, has attracted great
attention from our community. Unfortunately, there is no general-purpose binary
rewriting framework for Wasm, and existing effort on Wasm binary modification
is error-prone and tedious. In this paper, we present BREWasm, the first
general purpose static binary rewriting framework for Wasm, which has addressed
inherent challenges of Wasm rewriting including high complicated binary
structure, strict static syntax verification, and coupling among sections. We
perform extensive evaluation on diverse Wasm applications to show the
efficiency, correctness and effectiveness of BREWasm. We further show the
promising direction of implementing a diverse set of binary rewriting tasks
based on BREWasm in an effortless and user-friendly manner
Learning Robust Deep Equilibrium Models
Deep equilibrium (DEQ) models have emerged as a promising class of implicit
layer models in deep learning, which abandon traditional depth by solving for
the fixed points of a single nonlinear layer. Despite their success, the
stability of the fixed points for these models remains poorly understood.
Recently, Lyapunov theory has been applied to Neural ODEs, another type of
implicit layer model, to confer adversarial robustness. By considering DEQ
models as nonlinear dynamic systems, we propose a robust DEQ model named LyaDEQ
with guaranteed provable stability via Lyapunov theory. The crux of our method
is ensuring the fixed points of the DEQ models are Lyapunov stable, which
enables the LyaDEQ models to resist minor initial perturbations. To avoid poor
adversarial defense due to Lyapunov-stable fixed points being located near each
other, we add an orthogonal fully connected layer after the Lyapunov stability
module to separate different fixed points. We evaluate LyaDEQ models on several
widely used datasets under well-known adversarial attacks, and experimental
results demonstrate significant improvement in robustness. Furthermore, we show
that the LyaDEQ model can be combined with other defense methods, such as
adversarial training, to achieve even better adversarial robustness
Drag-A-Video: Non-rigid Video Editing with Point-based Interaction
Video editing is a challenging task that requires manipulating videos on both
the spatial and temporal dimensions. Existing methods for video editing mainly
focus on changing the appearance or style of the objects in the video, while
keeping their structures unchanged. However, there is no existing method that
allows users to interactively ``drag'' any points of instances on the first
frame to precisely reach the target points with other frames consistently
deformed. In this paper, we propose a new diffusion-based method for
interactive point-based video manipulation, called Drag-A-Video. Our method
allows users to click pairs of handle points and target points as well as masks
on the first frame of an input video. Then, our method transforms the inputs
into point sets and propagates these sets across frames. To precisely modify
the contents of the video, we employ a new video-level motion supervision to
update the features of the video and introduce the latent offsets to achieve
this update at multiple denoising timesteps. We propose a temporal-consistent
point tracking module to coordinate the movement of the points in the handle
point sets. We demonstrate the effectiveness and flexibility of our method on
various videos. The website of our work is available here:
https://drag-a-video.github.io/
A Survey on EOSIO Systems Security: Vulnerability, Attack, and Mitigation
EOSIO, as one of the most representative blockchain 3.0 platforms, involves
lots of new features, e.g., delegated proof of stake consensus algorithm and
updatable smart contracts, enabling a much higher transaction per second and
the prosperous decentralized applications (DApps) ecosystem. According to the
statistics, it has reached nearly 18 billion USD, taking the third place of the
whole cryptocurrency market, following Bitcoin and Ethereum. Loopholes,
however, are hiding in the shadows. EOSBet, a famous gambling DApp, was
attacked twice within a month and lost more than 1 million USD. No existing
work has surveyed the EOSIO from a security researcher perspective. To fill
this gap, in this paper, we collected all occurred attack events against EOSIO,
and systematically studied their root causes, i.e., vulnerabilities lurked in
all relying components for EOSIO, as well as the corresponding attacks and
mitigations. We also summarized some best practices for DApp developers, EOSIO
official team, and security researchers for future directions.Comment: 34 pages, 12 figure
- …