no code implementations • 22 Nov 2020 • Jiang Zhang, Ivan Beschastnikh, Sergey Mechtaev, Abhik Roychoudhury
Data-driven decision making is gaining prominence with the popularity of various machine learning models.
1 code implementation • NeurIPS 2020 • Umair Z. Ahmed, Maria Christakis, Aleksandr Efremov, Nigel Fernandez, Ahana Ghosh, Abhik Roychoudhury, Adish Singla
Our task synthesis algorithm operates by first mutating code $\rm C^{in}$ to obtain a set of codes $\{\rm C^{out}\}$.
1 code implementation • 12 Dec 2019 • Xiao Liang Yu, Omar Al-Bataineh, David Lo, Abhik Roychoudhury
Our approach can be used to optimise the overall security and reliability of smart contracts against malicious attackers.
Software Engineering Cryptography and Security 68N15 D.1.2
1 code implementation • 2 Sep 2019 • Guanhua Wang, Sudipta Chattopadhyay, Arnab Kumar Biswas, Tulika Mitra, Abhik Roychoudhury
Spectre attacks disclosed in early 2018 expose data leakage scenarios via cache side channels.
Cryptography and Security
no code implementations • 23 Nov 2018 • Van-Thuan Pham, Marcel Böhme, Andrew E. Santosa, Alexandru Răzvan Căciulescu, Abhik Roychoudhury
In this work, we introduce smart greybox fuzzing (SGF) which leverages a high-level structural representation of the seed file to generate new files.
Cryptography and Security
2 code implementations • 16 Jul 2018 • Guanhua Wang, Sudipta Chattopadhyay, Ivan Gotovchits, Tulika Mitra, Abhik Roychoudhury
In this paper, we propose oo7, a static analysis approach that can mitigate Spectre attacks by detecting potentially vulnerable code snippets in program binaries and protecting them against the attack by patching them.
Cryptography and Security