{"636789":{"#nid":"636789","#data":{"type":"event","title":"PhD Defense by Meng Xu","body":[{"value":"\u003Cp\u003E\u003Cstrong\u003ETitle\u003C\/strong\u003E: Finding Race Conditions in Kernels: the Symbolic Way and the Fuzzy Way\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003EMeng Xu\u003C\/p\u003E\r\n\r\n\u003Cp\u003EPh.D. Candidate\u003C\/p\u003E\r\n\r\n\u003Cp\u003ESchool of Computer Science\u003C\/p\u003E\r\n\r\n\u003Cp\u003ECollege of Computing\u003C\/p\u003E\r\n\r\n\u003Cp\u003EGeorgia Institute of Technology\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003EDate\u003C\/strong\u003E: Thursday, July 16th\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003ETime\u003C\/strong\u003E: 1:30pm - 3:00pm (EST)\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003ELocation\u003C\/strong\u003E: \u003Ca href=\u0022https:\/\/bluejeans.com\/199452819\u0022\u003Ehttps:\/\/bluejeans.com\/199452819\u003C\/a\u003E (remote)\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003ECommittee\u003C\/strong\u003E:\u003C\/p\u003E\r\n\r\n\u003Cp\u003EDr. Taesoo Kim (Advisor), School of Computer Science, Georgia Tech\u003C\/p\u003E\r\n\r\n\u003Cp\u003EDr. Wenke Lee, School of Computer Science, Georgia Tech\u003C\/p\u003E\r\n\r\n\u003Cp\u003EDr. Alessandro Orso, School of Computer Science, Georgia Tech\u003C\/p\u003E\r\n\r\n\u003Cp\u003EDr. Brendan D. Saltaformaggio, School of Electrical and Computer Engineering and School of Computer Science, Georgia Tech\u003C\/p\u003E\r\n\r\n\u003Cp\u003EDr. Marcus Peinado, Microsoft Research\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u003Cstrong\u003EAbstract\u003C\/strong\u003E:\u003C\/p\u003E\r\n\r\n\u003Cp\u003EThe scale and pervasiveness of concurrent software pose challenges\u003C\/p\u003E\r\n\r\n\u003Cp\u003Efor security researchers: race conditions are more prevalent than ever, and\u003C\/p\u003E\r\n\r\n\u003Cp\u003Ethe growing software complexity keeps exacerbating the situation --- expanding\u003C\/p\u003E\r\n\r\n\u003Cp\u003Ethe arms race between security practitioners and attackers beyond memory errors.\u003C\/p\u003E\r\n\r\n\u003Cp\u003EAs a consequence, we need a new generation of bug hunting tools that not only\u003C\/p\u003E\r\n\r\n\u003Cp\u003Escale well with increasingly larger codebases but also catch up with the growing\u003C\/p\u003E\r\n\r\n\u003Cp\u003Eimportance of race conditions.\u003C\/p\u003E\r\n\r\n\u003Cp\u003E\u0026nbsp;\u003C\/p\u003E\r\n\r\n\u003Cp\u003EIn this dissertation, I will present two complementary bug hunting frameworks that\u003C\/p\u003E\r\n\r\n\u003Cp\u003Emight meet the scalability and agility requirements: focused symbolic checking\u003C\/p\u003E\r\n\r\n\u003Cp\u003Eand multi-dimensional fuzz testing, and showcase their effectiveness in a\u003C\/p\u003E\r\n\r\n\u003Cp\u003Echallenging arena: OS kernels. While symbolic execution can never scale up to\u003C\/p\u003E\r\n\r\n\u003Cp\u003Ethe whole kernel, complete checking may nevertheless be possible in carefully\u003C\/p\u003E\r\n\r\n\u003Cp\u003Econstructed program slices. I will demonstrate how precise models for race\u003C\/p\u003E\r\n\r\n\u003Cp\u003Econditions can help build such slices and enable a jumpstart of symbolic\u003C\/p\u003E\r\n\r\n\u003Cp\u003Eexecution from the middle of a program. On the other hand, fuzz testing turns\u003C\/p\u003E\r\n\r\n\u003Cp\u003Ebug finding into a probabilistic search, but current practices restrict\u003C\/p\u003E\r\n\r\n\u003Cp\u003Ethemselves to one dimension only (sequential executions). I will illustrate how\u003C\/p\u003E\r\n\r\n\u003Cp\u003Eto explore the concurrency dimension and extend the bug scope beyond memory\u003C\/p\u003E\r\n\r\n\u003Cp\u003Eerrors to the broad spectrum of concurrency bugs.\u003C\/p\u003E\r\n","summary":null,"format":"limited_html"}],"field_subtitle":"","field_summary":"","field_summary_sentence":[{"value":"Finding Race Conditions in Kernels: the Symbolic Way and the Fuzzy Way"}],"uid":"27707","created_gmt":"2020-07-07 20:28:20","changed_gmt":"2020-07-07 20:28:20","author":"Tatianna Richardson","boilerplate_text":"","field_publication":"","field_article_url":"","field_event_time":{"event_time_start":"2020-07-16T14:30:00-04:00","event_time_end":"2020-07-16T16:30:00-04:00","event_time_end_last":"2020-07-16T16:30:00-04:00","gmt_time_start":"2020-07-16 18:30:00","gmt_time_end":"2020-07-16 20:30:00","gmt_time_end_last":"2020-07-16 20:30:00","rrule":null,"timezone":"America\/New_York"},"extras":[],"groups":[{"id":"221981","name":"Graduate Studies"}],"categories":[],"keywords":[{"id":"100811","name":"Phd Defense"}],"core_research_areas":[],"news_room_topics":[],"event_categories":[{"id":"1788","name":"Other\/Miscellaneous"}],"invited_audience":[{"id":"78761","name":"Faculty\/Staff"},{"id":"78771","name":"Public"},{"id":"174045","name":"Graduate students"},{"id":"78751","name":"Undergraduate students"}],"affiliations":[],"classification":[],"areas_of_expertise":[],"news_and_recent_appearances":[],"phone":[],"contact":[],"email":[],"slides":[],"orientation":[],"userdata":""}}}