News

Grades in LSF

Written on 01.03.21 (last change on 01.03.21) by Cristian-Alexandru Staicu

Dear all,

Please double-check that you were assigned the grade for the seminar in LSF and let me know if you have any complaints, questions, or feedback. Thank you very much for choosing this seminar. I hope that by doing so you got a more clear understanding of existing state-of-the-art… Read more

Dear all,

Please double-check that you were assigned the grade for the seminar in LSF and let me know if you have any complaints, questions, or feedback. Thank you very much for choosing this seminar. I hope that by doing so you got a more clear understanding of existing state-of-the-art vulnerability detection techniques, and in particular about the program analysis-based ones. I also hope that the individualized feedback I sent each of you, both after the presentation and after submitting the report/draft, will help you improve your scientific writing and your presentation skills. I wish you all the best with the rest of your studies.

Best,

Cris

Zoom meeting invitation

Written on 05.11.20 by Cristian-Alexandru Staicu

Please check your emails (including the spam folder) to find the invitation for the Zoom meeting. 

Kick off the seminar

Written on 02.11.20 by Cristian-Alexandru Staicu

Hey all,

Thanks for choosing this seminar. Please vote in the following doodle, so we can agree on a time slot for the seminar (on Thursdays):

https://doodle.com/poll/r8mwuf49t84yf6rc?utm_source=poll&utm_medium=link
Additionally, please send me a list of five topics you would like to be… Read more

Hey all,

Thanks for choosing this seminar. Please vote in the following doodle, so we can agree on a time slot for the seminar (on Thursdays):

https://doodle.com/poll/r8mwuf49t84yf6rc?utm_source=poll&utm_medium=link
Additionally, please send me a list of five topics you would like to be assigned to. The list should be ordered from your first preference to your fifth. 

Best,

Cris

P.S. I also sent you an email with additional information earlier today.

Description

Program analysis is a mature research area at the intersection of programming languages, formal methods, and software engineering. One of its main applications is automatic vulnerability detection. However, the complexity of modern systems is overwhelming and the vulnerabilities to be detected are increasingly sophisticated. To account for these particularities, many recent approaches advocate for lightweight program analysis techniques or hybrid methods, i.e., static and dynamic analysis. This seminar explores the trade-offs involved in designing a program analysis that scales to analyzing the security of real systems. In this seminar, we will discuss recent research papers in the area in a reading group format. Each week, one student will present papers covering a given topic, followed by a discussion. All participants are expected to actively participate in the discussion by asking questions.

Logistics

Instructor: Cristian-Alexandru Staicu

Time: Thursday, 15:00 (3pm)

Location: Zoom (Disclaimer) - link to the recurring meeting was sent by email.

Semester Plan

  • 5th of November - kick-off meeting,
  • 12th of November - Paul KrappenVulnerabilities in low-level programs,
  • 19th of November - Raoul ScholtesVulnerabilities in web applications,
  • 26th of November - Pit JostDetect misuses of crypto APIs,
  • 3rd of December - Tristan Hornetz, Removing vulnerabilities through debloating,
  • 10th of December - Jeremy Rack, Automatic patching of vulnerabilities,
  • 17th of December - Banji OlorundareFuzzing compilers and engines,
  • 7th of January - Tim WalitaVulnerabilities in software components and dependencies,
  • 14th of January  - Jonathan BuschVulnerabilities in mobile apps,
  • 21st of January  - Dominic TroppmannVulnerability prediction,
  • 28th of January  - Muhammad Bilal LatifMachine learning-aided vulnerability detection,
  • 4th of February - Dominik SautterAvailability vulnerabilities.

Grading system

The final grade is an aggregate of the following parts, both presentation and final report are mandatory:

  • 50% the final report,
  • 50% the presentation,
  • bonus: up to 15% for being active in class,
  • bonus: up to 15% for the hands-on exercise. 

Supporting Materials

Please find below a set of useful materials for the seminar:

  • The kick-off presentation's slides contain useful information about the structure and goals of this seminar, but also some required background for the assigned papers.
  • Sample presentation 1 - you should aim for this much content when presenting each of the assigned papers (approx. 10 minutes). See the kick-off presentation for the recommended presentation's structure.
  • Sample presentation 2 - a slightly longer presentation (approx. 15 minutes).
  • Consider using the following template for the report and its associated sources.

Topics

  1. Vulnerabilities in web applications
  2. Vulnerabilities in software components and dependencies
  3. Vulnerabilities in mobile apps
  4. Detect misuses of crypto APIs
  5. Vulnerabilities in low-level programs
  6. Fuzzing low-level programs
  7. Fuzzing compilers and engines
  8. Machine learning-aided vulnerability detection
  9. Availability vulnerabilities
  10. Automatic patching of vulnerabilities
  11. Removing vulnerabilities through debloating
  12. Vulnerability prediction
Privacy Policy | Legal Notice
If you encounter technical problems, please contact the administrators.