[2022.02.16] [ISSTA 2021] Semantic Matching of GUI Events for Test Reuse Are We There Yet?

Source: https://doi.org/10.1145/3460319.3464827 Authors: Leonardo Mariani, Ali Mohebbi, Mauro Pezzè, Valerio Terragni Download Note: https://jbox.sjtu.edu.cn/l/g1nobP Contributor: zyt Overview UI测试重用(UI Test Reuse)是目前在UI自动化测试领域的研究热点,旨在解决UI自动化测试中测试用例缺乏语义信息,难以检测系统功能上正确性的弊端。其方法是在一个源app中人工生成一个有效的UI事件序列(例如:完整的注册过程),并在另一个目标app中,通过语义匹配的方式,确定源事件在目标app上的对应事件,从而在目标app上自动生成一个有效的测试用例。语义匹配是UI测试重用的重要模块,其目的是通过提取UI上的信息,分析UI表达的语义含义,从而提高事件匹配的准确性。 本文针对UI测试重用中的子模块——语义匹配,进行系统性地评估分析。整个语义匹配系统被分为四个部分:语料库,词嵌入算法,事件描述符提取和语义匹配算法。作者对四个部分所有的252种配置可能进行实验,并与baseline进行对比,分析语义匹配系统各个组成部分对系统的影响。

[2022.03.03] [ICSE 2022] PROMAL: Precise Window Transition Graphs for Android Synergy of Program Analysis and Machine Learning

作者:Changlin Liu, Hanlin Wang, Tianming Liu, Diandian Gu, Yun Ma, Haoyu Wang, Xusheng Xiao 单位:Case Western Reserve University, Monash University, Peking University, Beijing University of Posts and Telecommunications 出处:ICSE 2022 原文:https://engineering.case.edu/groups/xusheng-xiao/sites/engineering.case.edu.groups.xusheng-xiao/files/docs/promal_icse_cr.pdf Contributor: FRH 笔记:https://jbox.sjtu.edu.cn/l/I1oHrr 利用自动化分析技术提高移动应用的质量和可靠性是非常重要的。WTG(window transition graph)是自动化分析技术的关键组件。在WTG中,点(node)代表窗口,边(edge)代表窗口之间的跳转。已有的研究工作通过静态或动态分析的方式构建WTG,但在准确度上仍然存在不足。静态分析采用over-approximation的设计导致误报,产生不可能的跳转,而动态分析受到覆盖率问题的影响。为此,作者提出"tribrid analysis"方法PROMAL,协同地组合了动静态分析技术和机器学习技术为应用构建WTG。PROMAL主要分为两个阶段: 首先使用静态分析构建WTG,结合动态分析对WTG中的跳转进行验证 对于大量动态分析无法验证的跳转,提取窗口的信息作为特征,利用机器学习技术预测跳转是否成立。 PROMAL的精度为90.18%,回归率为79.69%,F1-score为82.82%。相比于GATOR(46.24%)、GATOR和PALADIN组合(61.93%)都有更好的表现。

[2022.02.23] [ESEC/FSE 2021] Vet: Identifying and Avoiding UI Exploration Tarpits

Source: https://dl.acm.org/doi/abs/10.1145/3468264.3468554 Authors: Wenyu Wang, Wei Yang, Tianyin Xu, Tao Xie Download Note: https://jbox.sjtu.edu.cn/l/910ku4 Contributor: syjh Overview 作者的实验表明表明,现有的移动 UI 测试工具很容易出现exploration tarpit。这些工具会在很长一段时间内卡在一小部分应用程序功能上。比如说,测试工具在测试某个APP时过早注销账户,后续测试时就容易卡在探索应用程序的登录前功能,而不是其主要功能。当然如果只是登录,测试者可以手动设定规则,但是这种exploration tarpit类型很多,没有一个统一的方法。 本文提出自动测试工具Vet,它针对两个常见的exploration tarpit制定了两个算法判定测试工具是否进入了exploration tarpit。Vet可以引导测试框架避免进入exploration tarpit或者从中恢复,因此Vet可以提高代码覆盖率。

[2021.11.24] [CCS 2021] SmashEx: Smashing SGX Enclaves Using Exceptions

Source: https://dl.acm.org/doi/pdf/10.1145/3460120.3484821 Authors: Jinhua Cui and Jason Zhijingcheng Yu. The Link of Note: https://jbox.sjtu.edu.cn/l/r15aTE Contributor: Fy. Overview Intel SGX的异常处理机制目前仍依赖于OS递交异常,而一个恶意的OS可以在任何时候触发一个异常。如果runtime没有恰当地进行异常触发的保护,会导致当程序在不可信和可信区间切换时,还没有完成对寄存器的清空就被迫进行中断处理,使得受攻击者控制的寄存器值被错误地写入可信区域的栈中,甚至通过不可信的栈指针实现对Enclave memory的任意地址写以及ROP攻击。

[2021.12.1] [Usenix Security 2022] MAGE: Mutual Attestation for a Group of Enclaves without Trusted Third Parties

Source: https://arxiv.org/pdf/2008.09501.pdf Authors: Guoxing Chen, and Yinqian Zhang. The Link of Note: https://jbox.sjtu.edu.cn/l/S1ugcT Contributor: lt. Overview Intel SGX的attestation机制支持enclave向其他enclave证明自己的身份。为了验证enclave是否可信,enclave会将信任的enclave的measurement放入初始数据中。但是,当多个enclave需要建立信任时,它们无法同时将对方的measurement放入自己的初始数据中,因为这个行为会使已放入的measurement失效。为此,作者提出了MAGE这一解决方案。

[2021.11.10] [Security and Communication Networks 2021] Blockchain as a CA: A Provably Secure Signcryption Scheme Leveraging Blockchains

Source: https://www.hindawi.com/journals/scn/2021/6637402/ Author: Tzung-Her Chen Ting-Le Zhu Fuh-Gwo Jeng and Chien-Lung Wang Journal: Security and Communication Networks 2021 (CCF C) Download Note: https://jbox.sjtu.edu.cn/l/x1uKe9 Contributor: PDH Introduction In the past decade, applying certificateless signcryption schemes to solve the higher cost of maintaining the certificate chain issued by a certificate authority (CA) has been studied. The concepts […]

[2021.11.17] [USENIX Security 2021] Sharing More and Checking Less: Leveraging Common Input Keywords to Detect Bugs in Embedded Systems

Source: https://www.usenix.org/system/files/sec21fall-chen-libo.pdf Authors: Libo Chen, Yanhao Wang, Quanpu Cai, Yunfan Zhan1, Hong Hu, JiaqiLinghu, Qinsheng Hou, Chao Zhang, Haixin Duan, Zhi Xue Download Note: https://jbox.sjtu.edu.cn/l/l1cmyY Contributor: ydh Overview IoT设备的使用越来越广泛,设备中存在的安全漏洞的影响也越来越大。IoT设备后端与用户交互往往需要通过Web,App等前端。许多嵌入式系统的漏洞都来自于Web。但是目前已有的漏洞检测方法都无法有效且高效地分析这样的web服务。这篇文章提出了一种新颖的静态污点分析的方法(SaTC),高效地检测嵌入式设备提供的web服务中的漏洞。主要检测两类IoT设备,无线路由器以及Web摄像头,这些设备为了方便管理使用往往都会有管理界面。有研究表明75%的IoT攻击都是对路由器的,Web摄像头排在第二15.2%

[2021.10.20] [NDSS 2021] Preventing and Detecting State Inference Attacks on Android

Source: http://s3.eurecom.fr/docs/ndss21_pox.pdf Author: Andrea Possemato, Dario Nisi, Yanick Fratantonio Affiliation: EURECOM Network and Distributed Systems Security (NDSS) Symposium 2021 Download https://jbox.sjtu.edu.cn/l/Q1LDjO Contributor: yzy Overview Phishing attacks : problematic for mobile platforms. because they do not provide enough information for a user to reliably distinguish a legitimate app from a malicious app spoofing the UI of […]

[2021.09.14] [CCS 2019] OPERA: Open Remote Attestation for Intel’s Secure Enclaves

Author: Guoxing Chen, Yinqian Zhang, Ten-Hwang Lai Affiliation: The Ohio State University, The Ohio State University, The Ohio State University Conference: CCS 2019 Paper Link: https://dl.acm.org/doi/10.1145/3319535.3354220 Note Link: https://jbox.sjtu.edu.cn/l/S1oYKk Contributor: pdh Overview This paper presents OPERA, which is an Open Platform for Enclave Remote Attestation. Instead of completely trusting the IAS, OPERA leverage the feature […]