1

Mitigating Information Leakage Vulnerabilities with Type-based Data Isolation

Information leakage vulnerabilities (or simply *info leaks*) such as out-of-bounds/uninitialized reads in the architectural or speculative domain pose a significant security threat, allowing attackers to leak sensitive data such as crypto keys. At …

LeanSym: Efficient Hybrid Fuzzing Through Conservative Constraint Debloating

To improve code coverage and flip complex program branches, hybrid fuzzers couple fuzzing with concolic execution. Despite its benefits, this strategy inherits the inherent slowness and memory bloat of concolic execution, due to path explosion and …