MINESTRONE: Identifying and containing
software vulnerabilities

MINESTRONE logo
 
Description →
Participants →
Publications →
Projects →
News →
 
AFRL

News

11/03/13
Our paper "ShadowReplica: Efficient Parallelization of Dynamic Data Flow Tracking" is to appear in the 20th ACM Conference on Computer and Communications Security (CCS).
11/03/13
Our paper "Parrot: a Practical Runtime for Deterministic, Stable, and Reliable Threads" is to appear in the 24th ACM Symposium on Operating Systems Principles (SOSP).
09/22/13
Our paper "An Accurate Stack Memory Abstraction and Symbolic Analysis Framework for Executables" is to appear in the 29th IEEE International Conference on Software Maintenance (ICSM).
08/27/13
Our paper "Transparent ROP Exploit Mitigation using Indirect Branch Tracing" is to appear in the 22nd USENIX Security Symposium.
08/12/13
Our paper "MINESTRONE: Testing the SOUP" is to appear in the 6th Workshop on Cyber Security Experimentation and Test (CSET).
07/08/13
Our paper "Expression Reduction from Programs in a Symbolic Binary Executor" is to appear in the 19th International SPIN Symposium on Model Checking of Software.
06/24/13
Our paper "Determinism Is Overrated: What Really Makes Multithreaded Programs Hard to Get Right and What Can Be Done about It" is to appear in the 5th USENIX Workshop on Hot Topics in Parallelism (HOTPAR).
06/24/13
Our paper "Redundant State Detection for Dynamic Symbolic Execution" is to appear in the USENIX Annual Technical Conference (ATC).
11/04/12
Our paper "Verifying Systems Rules Using Rule-Directed Symbolic Execution" is to appear in the 18th International Conference on Architecture Support for Programming Languages and Operating Systems (ASPLOS).
08/17/12
Our paper "Self-healing Multitier Architectures Using Cascading Rescue Points" is to appear in the 2012 Annual Computer Security Applications Conference (ACSAC).
07/10/12
Our paper "Adaptive Defenses for Commodity Software through Virtual Application Partitioning" is to appear in the 19th ACM Conference on Computer and Communications Security (CCS).
07/03/12
Our paper "Practical Software Diversification Using In-Place Code Randomization " is to appear in the Moving Target Defense II: Application of Game Theory and Adversarial Modeling.
06/01/12
Our paper "A Dependability Analysis of Hardware-Assisted Polling Integrity Checking Systems" is to appear in the International Conference on Dependable Systems and Networks (IEEE DSN).
04/23/12
Our paper "kGuard: Lightweight Kernel Protection against Return-to-user Attacks" is to appear in the 21st USENIX Security Symposium.
04/02/12
Our paper "Concurrency Attacks" is to appear in the 4th USENIX Workshop on Hot Topics in Parallelism (HotPar).
02/01/12
Our paper "Sound and Precise Analysis of Multithreaded Programs through Schedule Specialization" is to appear in the Conference on Programming Language Design and Implementation (PLDI).
02/01/12
Our paper "Smashing the Gadgets: Hindering Return-Oriented Programming Using In-Place Code Randomization" is to appear in the IEEE Symposium on Security & Privacy (S&P).
12/19/11
Our paper "libdft: Practical Dynamic Data Flow Tracking for Commodity Systems" is to appear in the International Conference on Virtual Execution Environments (VEE).
12/03/11
Our paper "SecureSwitch: BIOS-Assisted Isolation and Switch between Trusted and Untrusted Commodity OSes" is to appear in the Annual Network and Distributed System Security Symposium (NDSS).
10/20/11
Our paper "A General Approach for Efficiently Accelerating Software-based Dynamic Data Flow Tracking on Commodity Hardware" is to appear in the Annual Network and Distributed System Security Symposium (NDSS).
09/15/11
Our paper "ROP Payload Detection Using Speculative Code Execution" is to appear in the International Conference on Malicious and Unwanted Software (MALWARE).
09/06/11
Our paper "From Prey To Hunter: Transforming Legacy Embedded Devices Into Exploitation Sensor Grids" is to appear in the Annual Computer Security Applications Conference (ACSAC).
08/02/11
Our paper "Killing the Myth of Cisco IOS Diversity: Recent Advances in Reliable Shellcode Design " is to appear in the 2011 USENIX Workshop on Offensive Technology (WOOT).
07/11/11
Our paper "Taint-Exchange: a Generic System for Cross-process and Cross-host Taint Tracking" is to appear in the 6th International Workshop on Security (IWSEC2011).
07/11/11
Our paper "REASSURE: A Self-contained Mechanism for Healing Software Using Rescue Points" is to appear in the 6th International Workshop on Security (IWSEC2011).
07/05/11
Our paper "Efficient Deterministic Multithreading through Schedule Relaxation" is to appear in the 23rd ACM Symposium on Operating Systems (SOSP).
07/05/11
Our paper "Pervasive Detection of Process Races in Deployed Systems" is to appear in the 23rd ACM Symposium on Operating Systems (SOSP).
06/05/11
Our paper "DoubleGuard: Detecting Intrusions In Multi-tier Web Applications " is to appear in the IEEE Journal on Transactions on Dependable and Secure Computing (TDSC).
06/03/11
Our paper "Defending Legacy Embedded Systems with Software Symbiotes " is to appear in the 14th International Symposium on Recent Advances in Intrusion Detection (RAID).
06/03/11
Our paper "Finding Concurrency Errors in Sequential Code---OS-level, In-vivo Model Checking of Process Races " is to appear in the 13th Workshop on Hot Topics in Operating Systems (HotOS XIII).
05/23/11
Our paper "Practical Software Model Checking via Dynamic Interface Reduction" is to appear in the 23rd ACM Symposium on Operating Systems Principles (SOSP).
05/10/11
Our paper "The MINESTRONE Architecture: Combining Static and Dynamic Analysis Techniques for Software Security (Research roadmap paper)" is to appear in the 1st SysSec Workshop.
05/05/11
Our paper "Firmware-assisted Memory Acquisition and Analysis tools for Digital Forensic (short paper)" is to appear in the 6th International Workshop on Systematic Approaches to Digital Forensic Engineering (IEEE SADFE 2011).
03/30/11
Our paper "Practical, low-effort equivalence verification of real code" is to appear in the 23rd International Conference on Computer Aided Verification (CAV).
01/27/11
Our paper "Retrofitting Security in COTS Software with Binary Rewriting" is to appear in the 26th IFIP International Information Security Conference (SEC).
12/18/10
Our paper "Global ISR: Toward a Comprehensive Defense Against Unauthorized Code Execution" is to appear in the ARO Workshop.
08/16/10
Our paper "Fast and Practical Instruction-Set Randomization for Commodity Systems " is to appear in the Annual Computer Security Applications Conference (ACSAC).
08/01/10
Our paper "Stable Deterministic Multithreading through Schedule Memoization" is to appear in the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI).
08/01/10
Our paper "Bypassing Races in Live Applications with Execution Filters" is to appear in the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI).
11/30/99
Our paper "The Devil is in the Constants: Bypassing Defenses in Browser JIT Engines" is to appear in the Network and Distributed System Security (NDSS) Symposium.
11/30/99
Our paper "IntFlow: Improving the Accuracy of Arithmetic Error Detection Using Information Flow Tracking" is to appear in the Annual Computer Security Applications Conference (ACSAC).
11/30/99
Our paper "Large-Scale Evaluation of a Vulnerability Analysis Framework" is to appear in the Workshop on Cyber Security Experimentation and Test (CSET).
11/30/99
Our paper "Dynamic Reconstruction of Relocation Information for Stripped Binaries" is to appear in the International Symposium on Research in Attacks, Intrusions and Defenses (RAID).
11/30/99
Our paper "Size Does Matter - Why Using Gadget-Chain Length to Prevent Code-reuse Attacks is Hard" is to appear in the USENIX Security Symposium.
11/30/99
Our paper "ret2dir: Rethinking Kernel Isolation" is to appear in the USENIX Security Symposium.
11/30/99
Our paper "Time Randomization to Thwart Concurrency Bug Exploitation" is to appear in the IEEE S&P Poster Reception.
11/30/99
Our paper "Out Of Control: Overcoming Control-Flow Integrity" is to appear in the IEEE Symposium on Security and Privacy.
11/30/99
Our paper " The Best of Both Worlds. A Framework for the Synergistic Operation of Host and Cloud Anomaly-based IDS for Smartphones" is to appear in the European Workshop on System Security (EUROSEC).
11/30/99
Our paper "The Other Side of the Fence: How to Protect Against Code Injection Attacks" is to appear in the PenTest Magazine.
11/30/99
Our paper "Effective Dynamic Detection of Alias Analysis Errors" is to appear in the European Software Engineering Conference and the ACM SIGSOFT International Symposium on Foundations of Software Engineering (ESEC-FSE).
11/30/99
Our paper "SPECTRE: A Dependable Introspection Framework via System Management Mode" is to appear in the IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).
11/30/99
Our paper "When Firmware Modifications Attack: A Case Study of Embedded Exploitation" is to appear in the Proceedings of NDSS.
11/30/99
Our paper "kGuard: Lightweight Kernel Protection" is to appear in the USENIX ;login: Magazine.

Latest News

11/03/13
Our paper "ShadowReplica: Efficient Parallelization of Dynamic Data Flow Tracking" is to appear in the 20th ACM Conference on Computer and Communications Security (CCS).
11/03/13
Our paper "Parrot: a Practical Runtime for Deterministic, Stable, and Reliable Threads" is to appear in the 24th ACM Symposium on Operating Systems Principles (SOSP).
09/22/13
Our paper "An Accurate Stack Memory Abstraction and Symbolic Analysis Framework for Executables" is to appear in the 29th IEEE International Conference on Software Maintenance (ICSM).
08/27/13
Our paper "Transparent ROP Exploit Mitigation using Indirect Branch Tracing" is to appear in the 22nd USENIX Security Symposium.
08/12/13
Our paper "MINESTRONE: Testing the SOUP" is to appear in the 6th Workshop on Cyber Security Experimentation and Test (CSET).
This work is supported by the United States Air Force Research Laboratory (AFRL) through Contract FA8650-10-C-7024. Opinions, findings, conclusions and recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the US Government, or the Air Force.