08/26/2025
Software bugs continue to pose significant challenges to modern society, causing considerable economic impact, and, in the worst case, leading to catastrophic physical consequences. When bugs evolve into security vulnerabilities, the risk of intentional exploitation carried out by malicious actors escalates, potentially creating severe consequences for human rights and national security. Thus, identifying and addressing the root causes of software vulnerabilities (at scale) became crucial. However, automated vulnerability identification is an inherently complex task. First, the diversity and complexity of modern software systems require an understanding of many domain-specific details, making it impossible to create a one-size-fits-all solution. Secondly, automated security analyses need to strike an optimal balance between precision and efficiency: catching as many instances of a class of vulnerability as possible, while reducing false positives.
This talk provides insights into the evolution of program analysis techniques, particularly focusing on Domain-Driven Automated Security Analyses (DDASA). In particular, the goal of a DDASA is to first design custom “oracles” to detect classes of domain-specific vulnerabilities, and then, leverage a combination of static and dynamic analyses to identify such weaknesses. During this presentation, I will discuss my approach to designing practical, domain-specific security analyses for the identification of vulnerabilities in complex software systems (such as firmware and DeFi applications) and demonstrate their effectiveness on real-world targets.
https://ucsb.zoom.us/j/5604068241