Shifting vulnerability detection left in the software development lifecycle improves product security by enabling early vulnerability detection, increasing remediation rates, and reducing exposure risk and remediation costs. However, highly effective vulnerability detection methods like fuzzing are resource-intensive and often conducted post-deployment, contradicting shift-left principles. This creates a need for effective validation tools that can be integrated into earlier development phases. To address this, my PhD research introduces three tools to help engineers validate security properties in code: a systematic testing framework for network protocol security, a runtime framework for validating security-sensitive behaviors in dependencies, and an automated tool for developing unit proofs to verify memory safety. Together, these tools empower engineers to validate critical security properties early in the development process.
Program Display Configuration
Tue 29 Apr
Displayed time zone: Eastern Time (US & Canada)change
09:00 - 10:05
Session 1: Security & Miscellaneous (talks and panel)Doctoral Symposium at 212 Chair(s): Tayana Conte Universidade Federal do Amazonas