{"id":"https://openalex.org/W4403536044","doi":"https://doi.org/10.1145/3691620.3695543","title":"STASE: Static Analysis Guided Symbolic Execution for UEFI Vulnerability Signature Generation","display_name":"STASE: Static Analysis Guided Symbolic Execution for UEFI Vulnerability Signature Generation","publication_year":2024,"publication_date":"2024-10-18","ids":{"openalex":"https://openalex.org/W4403536044","doi":"https://doi.org/10.1145/3691620.3695543"},"language":"en","primary_location":{"id":"doi:10.1145/3691620.3695543","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3691620.3695543","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3691620.3695543","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034243571","display_name":"Md Shafiuzzaman","orcid":"https://orcid.org/0000-0002-1649-2906"},"institutions":[{"id":"https://openalex.org/I154570441","display_name":"University of California, Santa Barbara","ror":"https://ror.org/02t274463","country_code":"US","type":"education","lineage":["https://openalex.org/I154570441"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Md Shafiuzzaman","raw_affiliation_strings":["University of California, Santa Barbara, Santa Barbara, California, USA"],"raw_orcid":"https://orcid.org/0000-0002-1649-2906","affiliations":[{"raw_affiliation_string":"University of California, Santa Barbara, Santa Barbara, California, USA","institution_ids":["https://openalex.org/I154570441"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067819966","display_name":"Achintya Desai","orcid":"https://orcid.org/0009-0003-0228-0069"},"institutions":[{"id":"https://openalex.org/I154570441","display_name":"University of California, Santa Barbara","ror":"https://ror.org/02t274463","country_code":"US","type":"education","lineage":["https://openalex.org/I154570441"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Achintya Desai","raw_affiliation_strings":["University of California, Santa Barbara, Santa Barbara, California, USA"],"raw_orcid":"https://orcid.org/0009-0003-0228-0069","affiliations":[{"raw_affiliation_string":"University of California, Santa Barbara, Santa Barbara, California, USA","institution_ids":["https://openalex.org/I154570441"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017547818","display_name":"Laboni Sarker","orcid":"https://orcid.org/0000-0002-4793-7859"},"institutions":[{"id":"https://openalex.org/I154570441","display_name":"University of California, Santa Barbara","ror":"https://ror.org/02t274463","country_code":"US","type":"education","lineage":["https://openalex.org/I154570441"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Laboni Sarker","raw_affiliation_strings":["University of California, Santa Barbara, Santa Barbara, California, USA"],"raw_orcid":"https://orcid.org/0000-0002-4793-7859","affiliations":[{"raw_affiliation_string":"University of California, Santa Barbara, Santa Barbara, California, USA","institution_ids":["https://openalex.org/I154570441"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5039991493","display_name":"Tevfik Bultan","orcid":"https://orcid.org/0000-0003-2993-1215"},"institutions":[{"id":"https://openalex.org/I154570441","display_name":"University of California, Santa Barbara","ror":"https://ror.org/02t274463","country_code":"US","type":"education","lineage":["https://openalex.org/I154570441"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tevfik Bultan","raw_affiliation_strings":["University of California, Santa Barbara, Santa Barbara, California, USA"],"raw_orcid":"https://orcid.org/0000-0003-2993-1215","affiliations":[{"raw_affiliation_string":"University of California, Santa Barbara, Santa Barbara, California, USA","institution_ids":["https://openalex.org/I154570441"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5034243571"],"corresponding_institution_ids":["https://openalex.org/I154570441"],"apc_list":null,"apc_paid":null,"fwci":0.4642,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.69440994,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"1783","last_page":"1794"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9975000023841858,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7695187330245972},{"id":"https://openalex.org/keywords/signature","display_name":"Signature (topology)","score":0.7629914283752441},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.739266574382782},{"id":"https://openalex.org/keywords/symbolic-execution","display_name":"Symbolic execution","score":0.6042360663414001},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3574187755584717},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.31386899948120117},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.20075026154518127},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.07263609766960144},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.0645967423915863}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7695187330245972},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.7629914283752441},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.739266574382782},{"id":"https://openalex.org/C2779639559","wikidata":"https://www.wikidata.org/wiki/Q7661178","display_name":"Symbolic execution","level":3,"score":0.6042360663414001},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3574187755584717},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.31386899948120117},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.20075026154518127},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.07263609766960144},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0645967423915863},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3691620.3695543","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3691620.3695543","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3691620.3695543","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3691620.3695543","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G417020745","display_name":null,"funder_award_id":"CCF-1901098","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"},{"id":"https://openalex.org/G4294274658","display_name":null,"funder_award_id":"CCF-2008660","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W2001424127","https://openalex.org/W2076090418","https://openalex.org/W2092483417","https://openalex.org/W2111021060","https://openalex.org/W2293040969","https://openalex.org/W2293624369","https://openalex.org/W2511015845","https://openalex.org/W2972616440","https://openalex.org/W3048272215","https://openalex.org/W3048661063","https://openalex.org/W3092076559","https://openalex.org/W4226361118","https://openalex.org/W4285134373","https://openalex.org/W4285586714","https://openalex.org/W4288057751","https://openalex.org/W4298447450","https://openalex.org/W4299301436","https://openalex.org/W4319996264","https://openalex.org/W4385080561","https://openalex.org/W6676548192","https://openalex.org/W6723669959","https://openalex.org/W6723704070","https://openalex.org/W6755810847"],"related_works":["https://openalex.org/W2905722102","https://openalex.org/W2155539595","https://openalex.org/W2752815423","https://openalex.org/W4306251929","https://openalex.org/W345638404","https://openalex.org/W2801797726","https://openalex.org/W4295529944","https://openalex.org/W844671342","https://openalex.org/W2521287362","https://openalex.org/W4239107164"],"abstract_inverted_index":{"Since":[0],"its":[1],"major":[2],"release":[3],"in":[4,50,243],"2006,":[5],"the":[6,14,42,100,170,183,189,194,209,218],"Unified":[7],"Extensible":[8],"Firmware":[9],"Interface":[10],"(UEFI)":[11],"has":[12,28],"become":[13],"industry":[15],"standard":[16],"for":[17,55,148,230],"interfacing":[18],"a":[19,67,110,135],"computer's":[20],"hardware":[21],"and":[22,47,61,99,128,164,177,196,214,226,239],"operating":[23],"system,":[24],"replacing":[25],"BIOS.":[26],"UEFI":[27,51,64,221],"higher":[29],"privileged":[30],"security":[31],"access":[32],"to":[33,96,124,143,159,207,217],"system":[34,43],"resources":[35],"than":[36],"any":[37],"other":[38],"software":[39],"component,":[40],"including":[41],"kernel.":[44],"Hence,":[45],"identifying":[46],"characterizing":[48],"vulnerabilities":[49,65,238,242],"is":[52,66],"extremely":[53],"important":[54],"computer":[56],"security.":[57],"However,":[58,180],"automated":[59],"detection":[60,163],"characterization":[62],"of":[63,102,173,185,198,220,233],"challenging":[68],"problem.":[69],"Static":[70],"vulnerability":[71,138,146,162,175,228],"analysis":[72,85,122,139],"techniques":[73,86],"are":[74,87,90],"scalable":[75],"but":[76,89],"lack":[77],"precision":[78],"(reporting":[79],"many":[80],"false":[81],"positives),":[82],"whereas":[83],"symbolic":[84,149,154,190,199],"precise":[88,161],"hampered":[91],"by":[92],"scalability":[93,197],"issues":[94],"due":[95],"path":[97],"explosion":[98],"cost":[101],"constraint":[103],"solving.":[104],"In":[105],"this":[106],"paper,":[107],"we":[108],"introduce":[109],"technique":[111],"called":[112],"STatic":[113],"Analysis":[114],"guided":[115],"Symbolic":[116],"Execution":[117],"(STASE),":[118],"which":[119,201],"integrates":[120],"both":[121],"approaches":[123],"leverage":[125],"their":[126,130],"strengths":[127],"minimize":[129],"weaknesses.":[131],"We":[132,151,212],"begin":[133],"with":[134],"rule-based":[136],"static":[137],"on":[140,156,169],"LLVM":[141],"bitcode":[142],"identify":[144],"potential":[145],"targets":[147],"execution.":[150],"then":[152],"focus":[153],"execution":[155,191],"each":[157],"target":[158],"achieve":[160],"signature":[165],"generation.":[166],"STASE":[167,216,224],"relies":[168],"manual":[171,204],"specification":[172],"reusable":[174],"rules":[176],"attacker-controlled":[178],"inputs.":[179],"it":[181],"automates":[182],"generation":[184,206],"harnesses":[186],"that":[187],"guide":[188],"process,":[192],"addressing":[193],"usability":[195],"execution,":[200],"typically":[202],"requires":[203],"harness":[205],"reduce":[208],"state":[210],"space.":[211],"implemented":[213],"applied":[215],"implementations":[219],"code":[222],"base.":[223],"detects":[225],"generates":[227],"signatures":[229],"5":[231],"out":[232],"9":[234],"recently":[235],"reported":[236],"PixieFail":[237],"13":[240],"new":[241],"Tianocore's":[244],"EDKII":[245],"codebase.":[246]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2025-12-27T23:08:20.325037","created_date":"2025-10-10T00:00:00"}
