Skip to main content

Showing 1–7 of 7 results for author: Godefroid, P

  1. arXiv:2112.10165  [pdf, other

    cs.CR cs.CY cs.SE

    What are Weak Links in the npm Supply Chain?

    Authors: Nusrat Zahan, Thomas Zimmermann, Patrice Godefroid, Brendan Murphy, Chandra Maddila, Laurie Williams

    Abstract: Modern software development frequently uses third-party packages, raising the concern of supply chain security attacks. Many attackers target popular package managers, like npm, and their users with supply chain attacks. In 2021 there was a 650% year-on-year growth in security attacks by exploiting Open Source Software's supply chain. Proactive approaches are needed to predict package vulnerabilit… ▽ More

    Submitted 14 February, 2022; v1 submitted 19 December, 2021; originally announced December 2021.

    Comments: (e.g.: 10 pages, 1 figure)

  2. arXiv:2103.03846  [pdf

    cs.SE

    Anomalicious: Automated Detection of Anomalous and Potentially Malicious Commits on GitHub

    Authors: Danielle Gonzalez, Thomas Zimmermann, Patrice Godefroid, Max Schaefer

    Abstract: Security is critical to the adoption of open source software (OSS), yet few automated solutions currently exist to help detect and prevent malicious contributions from infecting open source repositories. On GitHub, a primary host of OSS, repositories contain not only code but also a wealth of commit-related and contextual metadata - what if this metadata could be used to automatically identify mal… ▽ More

    Submitted 9 March, 2021; v1 submitted 5 March, 2021; originally announced March 2021.

    Comments: 10 pages, 3 figures, 3 tables. To appear at the 2021 International Conference on Software Engineering (ICSE), Software Engineering in Practice (SEiP) track

  3. arXiv:2012.11401  [pdf, other

    cs.AI cs.PL

    Universal Policies for Software-Defined MDPs

    Authors: Daniel Selsam, Jesse Michael Han, Leonardo de Moura, Patrice Godefroid

    Abstract: We introduce a new programming paradigm called oracle-guided decision programming in which a program specifies a Markov Decision Process (MDP) and the language provides a universal policy. We prototype a new programming language, Dodona, that manifests this paradigm using a primitive 'choose' representing nondeterministic choice. The Dodona interpreter returns either a value or a choicepoint that… ▽ More

    Submitted 21 December, 2020; originally announced December 2020.

  4. arXiv:2005.11498  [pdf, other

    cs.SE cs.LG

    Pythia: Grammar-Based Fuzzing of REST APIs with Coverage-guided Feedback and Learning-based Mutations

    Authors: Vaggelis Atlidakis, Roxana Geambasu, Patrice Godefroid, Marina Polishchuk, Baishakhi Ray

    Abstract: This paper introduces Pythia, the first fuzzer that augments grammar-based fuzzing with coverage-guided feedback and a learning-based mutation strategy for stateful REST API fuzzing. Pythia uses a statistical model to learn common usage patterns of a target REST API from structurally valid seed inputs. It then generates learning-based mutations by injecting a small amount of noise deviating from c… ▽ More

    Submitted 23 May, 2020; originally announced May 2020.

  5. arXiv:1806.09739  [pdf, other

    cs.SE

    REST-ler: Automatic Intelligent REST API Fuzzing

    Authors: Vaggelis Atlidakis, Patrice Godefroid, Marina Polishchuk

    Abstract: Cloud services have recently exploded with the advent of powerful cloud-computing platforms such as Amazon Web Services and Microsoft Azure. Today, most cloud services are accessed through REST APIs, and Swagger is arguably the most popular interface-description language for REST APIs. A Swagger specification describes how to access a cloud service through its REST API (e.g., what requests the ser… ▽ More

    Submitted 25 June, 2018; originally announced June 2018.

  6. arXiv:1801.04589  [pdf, other

    cs.AI cs.CR

    Deep Reinforcement Fuzzing

    Authors: Konstantin Böttinger, Patrice Godefroid, Rishabh Singh

    Abstract: Fuzzing is the process of finding security vulnerabilities in input-processing code by repeatedly testing the code with modified inputs. In this paper, we formalize fuzzing as a reinforcement learning problem using the concept of Markov decision processes. This in turn allows us to apply state-of-the-art deep Q-learning algorithms that optimize rewards, which we define from runtime properties of t… ▽ More

    Submitted 14 January, 2018; originally announced January 2018.

  7. arXiv:1701.07232  [pdf, other

    cs.AI cs.CR cs.LG cs.PL cs.SE

    Learn&Fuzz: Machine Learning for Input Fuzzing

    Authors: Patrice Godefroid, Hila Peleg, Rishabh Singh

    Abstract: Fuzzing consists of repeatedly testing an application with modified, or fuzzed, inputs with the goal of finding security vulnerabilities in input-parsing code. In this paper, we show how to automate the generation of an input grammar suitable for input fuzzing using sample inputs and neural-network-based statistical machine-learning techniques. We present a detailed case study with a complex input… ▽ More

    Submitted 25 January, 2017; originally announced January 2017.