MINESTRONE: Identifying and containing
software vulnerabilities

MINESTRONE logo
 
Description →
Participants →
Publications →
Projects →
News →
 
AFRL

Publications

The Devil is in the Constants: Bypassing Defenses in Browser JIT Engines
Michalis Athanasakis, Elias Athanasopoulos, Michalis Polychronakis, Georgios Portokalidis, and Sotiris Ioannidis
In Proceedings of the Network and Distributed System Security (NDSS) Symposium, February 2015.

IntFlow: Improving the Accuracy of Arithmetic Error Detection Using Information Flow Tracking [PDF]
Kangkook Jee, Theofilos Petsios, Marios Pomonis, Michalis Polychronakis, and Angelos D. Keromytis
In Proceedings of the 30 th Annual Computer Security Applications Conference (ACSAC), December 2014. (Acceptance rate: 19.9%)

Large-Scale Evaluation of a Vulnerability Analysis Framework [PDF]
Nathan Evans, Azzedine Benameur, and Matthew Elder
In Proceedings of the 7th Workshop on Cyber Security Experimentation and Test (CSET), August 2014.

Dynamic Reconstruction of Relocation Information for Stripped Binaries [PDF]
Vasilis Pappas, Michalis Polychronakis, and Angelos D. Keromytis
In Proceedings of the 17th International Symposium on Research in Attacks, Intrusions and Defenses (RAID), September 2014. (Acceptance rate: 19.5%)

Size Does Matter - Why Using Gadget-Chain Length to Prevent Code-reuse Attacks is Hard [PDF]
Enes Goktas, Elias Athanasopoulos, Herbert Bos, Michalis Polychronakis, and Georgios Portokalidis
In Proceedings of the 23rd USENIX Security Symposium, August 2014. (Acceptance rate: 19%)

ret2dir: Rethinking Kernel Isolation [PDF]
Vasileios P. Kemerlis, Michalis Polychronakis, and Angelos D. Keromytis
In Proceedings of the 23rd USENIX Security Symposium, August 2014.

Time Randomization to Thwart Concurrency Bug Exploitation [PDF]
David Tagatac, Sal Stolfo
In IEEE S&P Poster Reception, May 2014.

Out Of Control: Overcoming Control-Flow Integrity [PDF]
Enes Goktas, Elias Athanasopoulos, Herbert Bos, and Georgios Portokalidis
In Proceedings of the 35th IEEE Symposium on Security and Privacy, May 2014. (Acceptance rate: 13.6%)

The Best of Both Worlds. A Framework for the Synergistic Operation of Host and Cloud Anomaly-based IDS for Smartphones [PDF]
Dimitrios Damopoulos, Georgios Kambourakis, and Georgios Portokalidis
In Proceedings of the 2014 European Workshop on System Security (EUROSEC), April 2014.

The Other Side of the Fence: How to Protect Against Code Injection Attacks
Azzedine Benameur, Nathan Evans, Matthew Elder
In PenTest Magazine, November 2013.

ShadowReplica: Efficient Parallelization of Dynamic Data Flow Tracking [PDF]
Kangkook Jee, Vasileios P. Kemerlis, Angelos D. Keromytis, and Georgios Portokalidis
In Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS), November 2013. (Acceptance rate: 19.8%)

Parrot: a Practical Runtime for Deterministic, Stable, and Reliable Threads [PDF]
Heming Cui, Jiri Simsa, Yi-Hong Lin, Hao Li, Ben Blum, Xinan Xu, Junfeng Yang, Garth A. Gibson, and Randal E. Bryant
In Proceedings of the 24th ACM Symposium on Operating Systems Principles (SOSP), November 2013.

An Accurate Stack Memory Abstraction and Symbolic Analysis Framework for Executables [PDF]
Kapil Anand, Khaled Elwazeer, Aparna Kotha, Matthew Smithson, Rajeev Barua and Angelos D. Keromytis
In Proceedings of the 29th IEEE International Conference on Software Maintenance (ICSM), September 2013.

Effective Dynamic Detection of Alias Analysis Errors [PDF]
Jingyue Wu, Gang Hu, Yang Tang, Junfeng Yang
In Proceedings of the Ninth joint meeting of the European Software Engineering Conference and the ACM SIGSOFT International Symposium on Foundations of Software Engineering (ESEC-FSE), August 2013.

MINESTRONE: Testing the SOUP [PDF]
Azzedine Benameur, Nathan S. Evans, and Matthew C. Elder
In Proceedings of the 6th Workshop on Cyber Security Experimentation and Test (CSET), August 2013.

Determinism Is Overrated: What Really Makes Multithreaded Programs Hard to Get Right and What Can Be Done about It [PDF]
Junfeng Yang, Heming Cui, and Jingyue Wu
In Proceedings of the 5th USENIX Workshop on Hot Topics in Parallelism (HOTPAR), June 2013.

Redundant State Detection for Dynamic Symbolic Execution [PDF]
Suhabe Bugrara and Dawson Engler
In Proceedings of the USENIX Annual Technical Conference (ATC), June 2013.

Transparent ROP Exploit Mitigation using Indirect Branch Tracing [PDF]
Vasilis Pappas, Michalis Polychronakis, and Angelos D. Keromytis
In Proceedings of the 22nd USENIX Security Symposium, August 2013. (Acceptance rate: 16.2%)

Expression Reduction from Programs in a Symbolic Binary Executor [PDF]
Anthony Romano and Dawson Engler
In Proceedings of the 19th International SPIN Symposium on Model Checking of Software, July 2013.

SPECTRE: A Dependable Introspection Framework via System Management Mode [PDF]
Fengwei Zhang, Kevin Leach, Kun Sun, and Angelos Stavrou
In Proceedings of 43 rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), June 2013.

Verifying Systems Rules Using Rule-Directed Symbolic Execution [PDF]
Heming Cui, Gang Hu, Jingyue Wu, and Junfeng Yang
In Proceedings of the 18th International Conference on Architecture Support for Programming Languages and Operating Systems (ASPLOS), March 2013.

When Firmware Modifications Attack: A Case Study of Embedded Exploitation [PDF]
Ang Cui, Michael Costello, Salvatore J. Stolfo
In Proceedings of NDSS, February 2013.

kGuard: Lightweight Kernel Protection [PDF]
Vasileios P. Kemerlis, Georgios Portokalidis, Elias Athanasopoulos, and Angelos D. Keromytis
In USENIX ;login: Magazine, November 2012.

Self-healing Multitier Architectures Using Cascading Rescue Points [PDF]
Angeliki Zavou, Georgios Portokalidis, and Angelos D. Keromytis
In Proceedings of the 2012 Annual Computer Security Applications Conference (ACSAC), December 2012. (Acceptance rate: 19%)

Adaptive Defenses for Commodity Software through Virtual Application Partitioning [PDF]
Dimitris Geneiatakis, Georgios Portokalidis, Vasileios P. Kemerlis, and Angelos D. Keromytis
In Proceedings of the 19th ACM Conference on Computer and Communications Security (CCS), October 2012. (Acceptance rate: 18.9%)

Practical Software Diversification Using In-Place Code Randomization [PDF]
Vasilis Pappas, Michalis Polychronakis, Angelos D. Keromytis
In Moving Target Defense II: Application of Game Theory and Adversarial Modeling, Sushil Jajodia, Anup K. Ghosh, V. S. Subrahmanian, Vipin Swarup, Cliff Wang, and X. Sean Wang (editors), July 2012.

kGuard: Lightweight Kernel Protection against Return-to-user Attacks [PDF]
Vasileios P. Kemerlis, Georgios Portokalidis, and Angelos D. Keromytis
In Proceedings of the 21st USENIX Security Symposium, August 2012. (Acceptance rate: 19.4%)

Concurrency Attacks [PDF]
Junfeng Yang and Ang Cui and Salvatore J. Stolfo and Simha Sethumadhavan
In Proceedings of the 4th USENIX Workshop on Hot Topics in Parallelism (HotPar), June 2012.

A Dependability Analysis of Hardware-Assisted Polling Integrity Checking Systems [PDF]
Jiang Wang, Kun Sun, Angelos Stavrou
In Proceedings of the 42 nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (IEEE DSN), June 2012.

Sound and Precise Analysis of Multithreaded Programs through Schedule Specialization [PDF]
Jingyue Wu, Yang Tang, Gang Hu, Heming Cui, Junfeng Yang
In Proceedings of the 2012 ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI), June 2012.

Smashing the Gadgets: Hindering Return-Oriented Programming Using In-Place Code Randomization [PDF]
Vasilis Pappas, Michalis Polychronakis, and Angelos D. Keromytis
In Proceedings of the 33rd IEEE Symposium on Security & Privacy (S&P), May 2012. (Acceptance rate: 13%)

libdft: Practical Dynamic Data Flow Tracking for Commodity Systems [PDF]
Vasileios P. Kemerlis, Georgios Portokalidis, Kangkook Jee, and Angelos D. Keromytis
In Proceedings of the 8th ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments (VEE), March 2012.

SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes [PDF]
Kun Sun, Jiang Wang, Fengwei Zhang and Angelos Stavrou
In Proceedings of the 19th Annual Network and Distributed System Security Symposium, February 2012. (Acceptance rate: 17.9%)

A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware [PDF]
Kangkook Jee, Georgios Portokalidis, Vasileios P. Kemerlis, Soumyadeep Ghosh, David I. August and Angelos D. Keromytis
In Proceedings of the 19th Annual Network and Distributed System Security Symposium (NDSS), February 2012. (Acceptance rate: 17.8%)

From Prey To Hunter: Transforming Legacy Embedded Devices Into Exploitation Sensor Grids [PDF]
Ang Cui, Jatin Kataria, and Salvatore J Stolfo
In Proceedings of the Annual Computer Security Applications Conference (ACSAC), December 2011.

ROP Payload Detection Using Speculative Code Execution [PDF]
Michalis Polychronakis and Angelos D. Keromytis
In Proceedings of the 6th International Conference on Malicious and Unwanted Software (MALWARE), October 2011. (Best Paper Award).

Killing the Myth of Cisco IOS Diversity: Recent Advances in Reliable Shellcode Design [PDF]
Ang Cui, Jatin Kataria, and Salvatore J Stolfo
In Proceedings of the USENIX Workshop on Offensive Technology (WOOT), August 2011. (also presented at Black Hat 2011).

Practical Software Model Checking via Dynamic Interface Reduction [PDF]
Huayang Guo, Ming Wu, Lidong Zhou, Gang Hu, Junfeng Yang, Lintao Zhang
In Proceedings of the 23rd ACM Symposium on Operating Systems Principles (SOSP), October 2011.

Efficient Deterministic Multithreading through Schedule Relaxation [PDF]
Heming Cui, Jingyue Wu, John Gallagher, Junfeng Yang
In Proceedings of the 23rd ACM Symposium on Operating Systems Principles (SOSP), October 2011.

Pervasive Detection of Process Races in Deployed Systems [PDF]
Oren Laadan, Chia-che Tsai, Nicolas Viennot, Chris Blinn, Peter Senyao Du, Junfeng Yang, Jason Nieh
In Proceedings of the 23rd ACM Symposium on Operating Systems Principles (SOSP), October 2011.

Taint-Exchange: a Generic System for Cross-process and Cross-host Taint Tracking [PDF]
Angeliki Zavou, Georgios Portokalidis, and Angelos D. Keromytis
In Proceedings 6th International Workshop on Security (IWSEC2011), November 2011.

REASSURE: A Self-contained Mechanism for Healing Software Using Rescue Points [PDF]
Georgios Portokalidis and Angelos D. Keromytis
In Proceedings 6th International Workshop on Security (IWSEC2011), November 2011.

Defending Legacy Embedded Systems with Software Symbiotes [PDF]
Ang Cui, Salvatore J. Stolfo
In Proceedings of the 14th International Symposium on Recent Advances in Intrusion Detection (RAID), September 2011.

DoubleGuard: Detecting Intrusions In Multi-tier Web Applications [PDF]
Meixing Le, Angelos Stavrou, Brent ByungHoon Kang
In IEEE Journal on Transactions on Dependable and Secure Computing (TDSC), December 2011.

Finding Concurrency Errors in Sequential Code---OS-level, In-vivo Model Checking of Process Races [PDF]
Oren Laadan, Chia-che Tsai, Nicolas Viennot, Chris Blinn, Peter Senyao Du, Junfeng Yang, Jason Nieh
In Proceedings of the 13th Workshop on Hot Topics in Operating Systems (HotOS XIII), May 2011.

The MINESTRONE Architecture: Combining Static and Dynamic Analysis Techniques for Software Security (Research roadmap paper) [PDF]
Angelos D. Keromytis, Salvatore J. Stolfo, Junfeng Yang, Angelos Stavrou, Anup Ghosh, Dawson Engler, Marc Dacier, Matthew Elder, Darrell Kienzle
In Proceedings of the 1st SysSec Workshop, July 2011. (co-located with DIMVA 2011).

Practical, low-effort equivalence verification of real code [PDF]
David A. Ramos, Dawson Engler
In Proceedings of the 23rd International Conference on Computer Aided Verification (CAV), July 2011.

Retrofitting Security in COTS Software with Binary Rewriting [PDF]
Padraig O'Sullivan, Kapil Anand, Aparna Kothan, Matthew Smithson, Rajeev Barua, Angelos D. Keromytis
In Proceedings of the 26th IFIP International Information Security Conference (SEC), June 2011.

Firmware-assisted Memory Acquisition and Analysis tools for Digital Forensic (short paper) [PDF]
Jiang Wang, Fengwei Zhang, Kun Sun, and Angelos Stavrou
In Proceedings of the 6th International Workshop on Systematic Approaches to Digital Forensic Engineering (IEEE SADFE 2011), May 2011. (held in conjunction with the IEEE Security and Privacy Symposium).

Global ISR: Toward a Comprehensive Defense Against Unauthorized Code Execution [PDF]
Georgios Portokalidis, Angelos D. Keromytis
In ARO Workshop on Moving Target Defense, October 2010.

Stable Deterministic Multithreading through Schedule Memoization [PDF]
Heming Cui, Jingyue Wu, Chia-che Tsai, Junfeng Yang
In Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI), October 2010.

Bypassing Races in Live Applications with Execution Filters [PDF]
Jingyue Wu, Heming Cui and Junfeng Yang
In Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI), October 2010.

Fast and Practical Instruction-Set Randomization for Commodity Systems [PDF]
Georgios Portokalidis, Angelos D. Keromytis
In Proceedings of the Annual Computer Security Applications Conference (ACSAC), December 2010. (Acceptance rate: 17%)

The MINESTRONE project was funded by the IARPA STONESOUP program, for the period 1 August 2010 through 30 November 2014. This research is based upon work supported by the Office of the Director of National Intelligence (ODNI), Intelligence Advanced Research Projects Activity (IARPA), via AFRL contract number FA8650-10-C-7024. The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of ODNI, IARPA, or the U.S. Government. The U.S. Government is authorized to reproduce and distribute reprints for Governmental purpose notwithstanding any copyright annotation thereon.

Latest News

11/03/13
Our paper "ShadowReplica: Efficient Parallelization of Dynamic Data Flow Tracking" is to appear in the 20th ACM Conference on Computer and Communications Security (CCS).
11/03/13
Our paper "Parrot: a Practical Runtime for Deterministic, Stable, and Reliable Threads" is to appear in the 24th ACM Symposium on Operating Systems Principles (SOSP).
09/22/13
Our paper "An Accurate Stack Memory Abstraction and Symbolic Analysis Framework for Executables" is to appear in the 29th IEEE International Conference on Software Maintenance (ICSM).
08/27/13
Our paper "Transparent ROP Exploit Mitigation using Indirect Branch Tracing" is to appear in the 22nd USENIX Security Symposium.
08/12/13
Our paper "MINESTRONE: Testing the SOUP" is to appear in the 6th Workshop on Cyber Security Experimentation and Test (CSET).
This work is supported by the United States Air Force Research Laboratory (AFRL) through Contract FA8650-10-C-7024. Opinions, findings, conclusions and recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the US Government, or the Air Force.