Talks

Want me to talk at your event?
Get in touch

JEX: A Straightforward, Portable and Scalable Framework for Automatic Exploit Generation for Java

Errors in the sanitization of user inputs lead to serious security vulnerabilities. Many applications contain such errors, making them vulnerable to input sanitization exploits. Therefore, internet worms, such as WannaCry, via exploiting vulnerabilities in applications infect hundreds of thousands of users in a matter of short time, causing hundreds of millions of dollars in damages. Undoubtedly the rapid spread of internet worms makes it impossible to manually protect the infection of a large number of hosts under attack... Read more....

Large-Scale Analysis on the Security and Performance of the Rust Compiler

Rust is a popular system programming language introduced by Mozilla in 2010 that provides strong compile-time correctness and high performance. The language has improved upon the ideas of other system languages, such as C++. Consequently, a wide range of programs, such as operating systems (e.g. RustOS), web frameworks (e.g. Rocket), and blockchain clients (e.g. Parity Ethereum Client) have been built in Rust. In this talk, we have share the result of my large-scale evaluation regarfing the security of the Rust compiler under real-world condition on a new benchmark suite, including core libraries and popular open-source projects... Read more....

Etherolic: A Concolic Execution System for Security Analysis of Smart Contracts

Considering numerous projects using smart contracts based on the blockchain technology racing to market, there is an ever-growing necessity for secure contracts to protect what could potentially be worth billions. Ethereum smart contracts are small executable programs, used on a peer-to-peer network as part of a consensus protocol. In other words, a smart contract is a set of low-level instructions being run on the Ethereum Virtual Machine (EVM). This low-level representation of smart contracts is called the Ethereum bytecode, which is public, immutable and once used in the blockchain, cannot be patched anymore. In this ongoing work, we present Etherolic, as the first runtime analysis framework based on concolic execution that analyzes the smart contracts’ bytecode for detecting various vulnerabilities and attacks. In contrast to previous tools, Etherolic does not need any source code and combines symbolic execution of bytecode with a presentation of concrete values from the public Ethereum blockchain. We evaluated Etherolic with a real-world benchmark suite, including 16 programs, containing public libraries. The result of our analysis demonstrates the effectiveness and usefulness of Etherolic in the real-life applications.

TaintSpy: Runtime Vulnerability Analyzing Framework for Scala

Scala is a functional programming and object-oriented language which is designed to be concise and compiled to Java bytecode so that a Scala application can be executed on a Java Virtual Machine (JVM). Scala’s designers claim that using static types in Scala help evade bugs in complex Scala applications. However, the recently discovered vulnerabilities in Scala applications shed doubt on this claim. Therefore, in this work, we introduce TaintSpy as a runtime vulnerability indicator which works based on dynamic taint analysis of Scala applications. Our proposed framework can identify security vulnerabilities without requiring the source code of applications. We demonstrate the usefulness of our framework by identifying and reporting several security vulnerabilities such as Remote Code Execution (RCE), Memory Corruption, DOS, SQL injection and XSS in standard Scala frameworks (e.g., Lift, Akka and Spray).

Practical Dynamic Taint Tracking for Exploiting Input Sanitization Error in Java Applications

Errors in the sanitization of user inputs lead to serious security vulnerabilities. Many applications contain such errors, making them vulnerable to input sanitization exploits. Therefore, internet worms via exploiting vulnerabilities in applications infect hundreds of thousands of users in a matter of short time, causing hundreds of millions of dollars in damages. To successfully counter internet worm attacks, we need automatic detection and defense mechanisms. First, we need automatic…

Interested in collaborating with me?

Looking for an experienced researcher or speaker for your workshop? To start an initial chat, just drop me an email at info@ashoury.de .