固定されたツイート
Kangjie Lu
Kangjie Lu
175 件のツイート
Kangjie Lu
@kengiter
Assistant Professor at UMN, working on Systems Security
Kangjie Luさんのツイート
8
18
17
返信先: さん, さん
1
3
Sazzadur Rahaman and I are going to co-chair session 6A (fuzzing) at 9:10am PST today. We have four papers about fuzz-testing new targets, new seed scheduling, etc. Welcome to join.
3
8
9
111
338
おすすめトピック
登録すると、フォローしているトピックについてのツイートがホームタイムラインに表示されます。
Carousel
スライド1/10 - カルーセル
- アニメ・漫画ウマ娘 プリティーダービーコミック
- バーチャルYouTuberビューティーエーペックスレジェンズ
- ファッション新世紀エヴァンゲリオンシリーズ作品
- ゲームイラストレーションメイク
I recently shared the abstract of our paper on the feasibility of vulnerability-introducing patches. Since it created many confusions, I chose to delete the tweet for now, but will provide more details and clarification.
6
1
3
返信先: さん
We told the maintainers that a bug was introduced and urged them to apply both or to discard patch A.
1
5. The goal of this research is to improve the patching process by raising the awareness of the issue, so to motivate people to develop automated patch testing/verification tools.
3
2
2
このスレッドを表示
So we also submitted patch B to also fix bug B before B was merged. In other words, we fix bug A with two steps.
3. The findings were reported to Linux maintainers before the submission.
4 No Linux user was hurt. We actually fixed three bugs.
6
5
3
このスレッドを表示
Clarification:
1. No bug was ever merged into code. The paper is demonstrating the possibility of such an issue.
2. This is how it was done: we first found a real bug A, we then submitted patch A to fix bug A, which would introduce bug B.
1
8
3
このスレッドを表示
返信先: さん
We did not. It just shows, be careful, malicious committers can potentially do this.
返信先: さん
Linux is open and encourages people to fix bugs. We followed the patching process and fixed three real bugs.
2
返信先: さん, さん
This is also a message to both industry and academia that we need better automated tools for testing/verifying patches.
Sure, thanks for the point. We will mention the point in the paper.
2
1
返信先: さん, さん
Yes, no actual harm. We actually fixed three real bugs. This research is really just to raise the awareness of this issue, so that in the future, more techniques can be developed to verify the patches.
2
2
返信先: さん
The goal of this research is to improve the patching process. By publishing, we hope the findings can raise the awareness of the issues. Before submitting the paper, we also reported the findings to maintainers.
2
4
返信先: さん, さん
We realized this potential concern, so we ensured several things in the experiments: none of the introduced vulnerabilities was ever merged into the code; the minor patches indeed fixed some issues; and we reported our findings to maintainers before the submission.
2
3
2
返信先: さん, さん
Yes, and directed fuzzing is particularly important in this scenario.
2
UMN CS is hiring!
引用ツイート
UMNComputerScience
@UMNComputerSci
·
Now hiring! Apply to join the computer science faculty at the University of Minnesota. We're looking for outstanding candidates with research & teaching interests in machine learning and its applications.
Learn more: cse.umn.edu/cs/faculty-rec
Apply online: z.umn.edu/cs-fac-search
4
14
I also like the geo-mean-based metrics! Hope to see it updated to include more recent data. Also, in the security area, why are some conferences like ACSAC and AsiaCCS not included? They have higher citation than the included SEC and Securecomm.
2
Yes, we should keep advocating for #PositiveReviewing, which is important to maintain a healthy community. In my (limited) cases, I did feel that the system security community is more positive than before: more constructive reviews and opportunities for fixing issues, etc.
引用ツイート
Mathias Payer
@gannimo
·
返信先: @thorstenholzさん
This sucks. Reviewing is not perfect and making sure that reviews and author responses are discussed in sufficient detail is a tough job for the chairs (and maybe RTF). This is why we need to argue for more #PositiveReviewing. Think about the merits, not the downsides of a paper
6
BTW, it is in system security.
このスレッドを表示
While NDSS chairs are trying to accept more papers, I am glad to find that 7 out of 18 papers (39% vs. overall 16%) I reviewed got minor/major revisions. Each paper has its own strengths. We should accept papers as long as the strengths are significant enough. #PositiveReviewing
2
2
32
このスレッドを表示
返信先: さん
To draw the conclusion, we should instead investigate the unfixed/unreported vulnerabilities, which is unfortunately hard.
1
返信先: さん
However, I found it hard to draw the conclusion, based on the findings, that the overall security of an SW is not increasing. All the findings could be a result of the recent advances in bug finding especially fuzzing.
1
返信先: さん
Some interesting findings: 1. The total number of reported vulnerabilities is increasing. 2. The rate of vulnerability finding in stable SW is relatively stable. 3. Memory errors dominate the landscape.
1
Sometimes we expect an EH function to not return, but it does; sometimes compilers expect an EH function to return, but it doesn't. Both cases would cause serious issues.
引用ツイート
Farce Majeure![🌹](data:image/svg+xml;base64,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)
@vathpela
·
Seriously though how was this 105 days ago?
github.com/rhboot/grub2/c
このスレッドを表示
3