Skip to main content

Showing 1–5 of 5 results for author: Amusuo, P C

.
  1. arXiv:2503.13762  [pdf, other

    cs.SE

    Do Unit Proofs Work? An Empirical Study of Compositional Bounded Model Checking for Memory Safety Verification

    Authors: Paschal C. Amusuo, Owen Cochell, Taylor Le Lievre, Parth V. Patil, Aravind Machiry, James C. Davis

    Abstract: Memory safety defects pose a major threat to software reliability, enabling cyberattacks, outages, and crashes. To mitigate these risks, organizations adopt Compositional Bounded Model Checking (BMC), using unit proofs to formally verify memory safety. However, methods for creating unit proofs vary across organizations and are inconsistent within the same project, leading to errors and missed defe… ▽ More

    Submitted 17 March, 2025; originally announced March 2025.

    Comments: 13 pages

    ACM Class: D.2.4; F.3.1

  2. arXiv:2410.14818  [pdf, other

    cs.SE

    A Unit Proofing Framework for Code-level Verification: A Research Agenda

    Authors: Paschal C. Amusuo, Parth V. Patil, Owen Cochell, Taylor Le Lievre, James C. Davis

    Abstract: Formal verification provides mathematical guarantees that a software is correct. Design-level verification tools ensure software specifications are correct, but they do not expose defects in actual implementations. For this purpose, engineers use code-level tools. However, such tools struggle to scale to large software. The process of "Unit Proofing" mitigates this by decomposing the software and… ▽ More

    Submitted 30 April, 2025; v1 submitted 18 October, 2024; originally announced October 2024.

    Comments: 5 pages, 2 figures

    ACM Class: D.2.4; F.3.1

  3. arXiv:2310.14117  [pdf, other

    cs.CR cs.SE

    ZTD$_{JAVA}$: Mitigating Software Supply Chain Vulnerabilities via Zero-Trust Dependencies

    Authors: Paschal C. Amusuo, Kyle A. Robinson, Tanmay Singla, Huiyun Peng, Aravind Machiry, Santiago Torres-Arias, Laurent Simon, James C. Davis

    Abstract: Third-party libraries like Log4j accelerate software application development but introduce substantial risk. Vulnerabilities in these libraries have led to Software Supply Chain (SSC) attacks that compromised resources within the host system. These attacks benefit from current application permissions approaches: thirdparty libraries are implicitly trusted in the application runtime. An application… ▽ More

    Submitted 20 December, 2024; v1 submitted 21 October, 2023; originally announced October 2023.

    Comments: 13 pages, 3 figures, 8 tables

    ACM Class: K.6.5; D.4.6

  4. arXiv:2308.10965  [pdf, other

    cs.SE

    Systematically Detecting Packet Validation Vulnerabilities in Embedded Network Stacks

    Authors: Paschal C. Amusuo, Ricardo Andrés Calvo Méndez, Zhongwei Xu, Aravind Machiry, James C. Davis

    Abstract: Embedded Network Stacks (ENS) enable low-resource devices to communicate with the outside world, facilitating the development of the Internet of Things and Cyber-Physical Systems. Some defects in ENS are thus high-severity cybersecurity vulnerabilities: they are remotely triggerable and can impact the physical world. While prior research has shed light on the characteristics of defects in many cla… ▽ More

    Submitted 21 August, 2023; originally announced August 2023.

    Comments: 12 pages, 3 figures, to be published in the 38th IEEE/ACM International Conference on Automated Software Engineering (ASE 2023)

    ACM Class: D.2.5

  5. Reflections on Software Failure Analysis

    Authors: Paschal C. Amusuo, Aishwarya Sharma, Siddharth R. Rao, Abbey Vincent, James C. Davis

    Abstract: Failure studies are important in revealing the root causes, behaviors, and life cycle of defects in software systems. These studies either focus on understanding the characteristics of defects in specific classes of systems or the characteristics of a specific type of defect in the systems it manifests in. Failure studies have influenced various software engineering research directions, especially… ▽ More

    Submitted 21 September, 2022; v1 submitted 7 September, 2022; originally announced September 2022.

    Comments: 6 pages, 4 figures To be published in: Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE '22)