Selected Publications


Precision Guided Approach to Mitigate Data Poisoning Attacks in Federated Learning
N. Kumar K, K. Mohan C, Aravind Machiry .
ACM CODASPY 2024 : Proceedings of the 14th ACM Conference on Data and Application Security and Privacy.
[pdf]

Fuzzing API Error Handling Behaviors using Coverage Guided Fault Injection
S. Sharma, S.R. Tanksalkar, S. Cherupattamoolayil, Aravind Machiry.
Asia CCS 2024:ACM ASIA Conference on Computer and Communications Security
[pdf]

Systematically Detecting Packet Validation Vulnerabilities in Embedded Network Stacks
P. Amusuo, R. Méndez, Z. Xu, Aravind Machiry , J. Davis.
ASE 2023 : Proceedings of the 38th ACM International Conference on Automated Software Engineering.
[pdf]

ARGUS: A Framework for Staged Static Taint Analysis of GitHub Workflows and Actions
S. Muralee, I. Koishybayev, A. Nahapetyan, G. Tystahl, B. Reaves, A. Bianchi, W. Enck, A. Kapravelos, Aravind Machiry.
USENIX Security 2023 : Proceedings of the 32nd USENIX Security Symposium.
[pdf]
CSAW 2023 Applied Research Finalist.

Security Properties of Virtual Remotes and SPOOKing their violations
J. Majors, E. Barsallo Yi, A. Maji, D. Wu, S. Bagchi, Aravind Machiry .
Asia CCS 2023:ACM ASIA Conference on Computer and Communications Security
[pdf]

TEEzz: Fuzzing Trusted Applications on COTS Android Devices
M. Busch, M. Payer, Aravind Machiry , C. Kruegel, G. Vigna, C. Spensky.
S&P 2023: 44nd IEEE Symposium on Security and Privacy.
[pdf]

Cornucopia: A Framework for Feedback Guided Generation of Binaries
V. Singhal, A. Pillai, C. Saumya, M. Kulkarni, Aravind Machiry
ASE 2022 : Proceedings of the 37th ACM International Conference on Automated Software Engineering.
[pdf]

Characterizing the Security of Github CI Workflows
I. Koishybayev, A. Nahapetyan, R. Zachariah, S. Muralee, B. Reaves, A. Kapravelos, Aravind Machiry
USENIX Security 2022 : Proceedings of the 31st USENIX Security Symposium.
[pdf]

Hybrid Pruning: Towards A Precise Static Analysis
D. Das, P. Bose, Aravind Machiry , S. Mariani, Y. Shoshitaishvili, C. Kruegel and G. Vigna
DIMVA 2022: 16th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment.
[pdf]

PacJam:Securing Dependencies Continuously via Package-Oriented Debloating
P. Pashakhanloo, Aravind Machiry , H. Choi, A. Canino, K. Heo, I. Lee, M. Naik
Asia CCS 2022:ACM ASIA Conference on Computer and Communications Security
[pdf]

C to Checked C by 3C
Aravind Machiry , J. Kastner, M. McCutchen, A. Eline, K. Headley, M. Hicks
OOPSLA 2022:Object-oriented Programming, Systems, Languages, and Applications
[pdf]
Distinguished Paper Award.

Tarnhelm: Isolated, Transparent and Confidential Execution of Arbitrary Code in ARM's TrustZone.
D. Quarta, M. Ianni, Aravind Machiry , Y. Fratantonio, E. Gustafson, D. Balzarotti, M. Lindorfer, C. Kruegel, and G. Vigna
CheckMate 2021: ACM Workshop on Research on Offensive and Defensive Techniques in the Context of Man At The End Attacks.
[pdf]

Toward a Secure Crowdsourced Location Tracking System.
C. Garg, Aravind Machiry , A. Continella, C. Kruegel, and G. Vigna
WiSec 2021: ACM Conference on Security and Privacy in Wireless and Mobile Networks.
[pdf]

ARBITRAR: User-Guided API Misuse Detection.
Z. Li, Aravind Machiry , B. Chen, M. Naik, K. Wang, L. Song
S&P 2021: 42nd IEEE Symposium on Security and Privacy.
[pdf]

Glitching Demystified: Analyzing Control-flow-based Glitching Attacks and Defenses.
C. Spensky, Aravind Machiry, N. Burow, H. Okhravi, R. Housley, Z. Gu, H. Jamjoom, C. Kruegel and G. Vigna
DSN 2021: 51st International Conference on Dependable Systems and Networks.
[pdf]

DIANE: Identifying Fuzzing Triggers in Apps to Generate Under-constrained Inputs for IoT Devices.
N. Redini, A. Continella, D. Das, G.De Pasquale, N. Spahn, Aravind Machiry , A. Bianchi, C. Kruegel, and G. Vigna
S&P 2021: 42nd IEEE Symposium on Security and Privacy.
[pdf]

Bran: Reduce Vulnerability Search Space in Large Open Source Repositories by Learning Bug Symptoms
D. Meng, M. Guerriero, Aravind Machiry, H. Aghakhani, P. Bose, A. Continella, C. Kruegel and G. Vigna
Asia CCS 2021:ACM ASIA Conference on Computer and Communications Security
[pdf]

Conware: Automated Modeling of Hardware Peripherals.
C. Spensky, Aravind Machiry, N. Redini, C. Unger, G. Foster, E. Balsband, H. Okhravi, C. Kruegel and G. Vigna
Asia CCS 2021:ACM ASIA Conference on Computer and Communications Security
[pdf]

Exploring Abstraction Functions in Fuzzing.
C. Salls, Aravind Machiry , A. Doupe, Y. Shoshitaishvili, C. Kruegel, G. Vigna
CNS 2020:IEEE Conference on Communications and Network Security (CNS) (IEEE CNS 2020)
[pdf]

TRUST.IO: Protecting Physical Interfaces on Cyber-physical Systems.
C. Spensky, Aravind Machiry , M. Busch, K. Leach, R. Housley, C. Kruegel, G. Vigna
CNS 2020:IEEE Conference on Communications and Network Security (CNS) (IEEE CNS 2020)
[pdf]

SPIDER: Enabling Fast Patch Propagation in Related Software Repositories.
Aravind Machiry, N. Redini, E. Camellini, C. Kruegel and G.Vigna.
S&P 2020: 41st IEEE Symposium on Security and Privacy.
[pdf]

KARONTE: Detecting Insecure Multi-binary Interactions in Embedded Firmware.
N. Redini, Aravind Machiry, R. Wang, C. Spensky, A. Continella, Y. Shoshitaishvili, C. Kruegel and G.Vigna.
S&P 2020: 41st IEEE Symposium on Security and Privacy.
[pdf]

(POSTER) Automated conversion of legacy code to Checked C.
Aravind Machiry, H. Touma, R. Chen, M. Hicks.
SecDev 2019: IEEE Secure Development Conference.
[pdf]

Toward the Analysis of Embedded Firmware through Automated Re-hosting.
E. Gustafson, M. Muench, C. Spensky, N. Redini, Aravind Machiry , Y. Fratantonio, D. Balzarotti, A. Francillon, Y. E. Choe, C. Kruegel, G. Vigna.
RAID 2019: 22nd International Symposium on Research in Attacks, Intrusions and Defenses.
[pdf]

BinTrimmer: Towards Static Binary Debloating Through Abstract Interpretation.
N. Redini, R. Wang, Aravind Machiry, Y. Shoshitaishvili, C. Kruegel and G. Vigna.
DIMVA 2019: 16th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment.
[pdf]

Automatically Generating a Sound and Complete Dataset for Evaluating Static Analysis Tools.
Aravind Machiry, N. Redini, E. Gustafson, H. Aghakhani, C. Kruegel and G. Vigna.
BAR 2019: 2nd Binary Analysis Research Workshop.
[pdf]

Using Loops For Malware Classification Resilient to Feature-unaware Perturbations.
Aravind Machiry, N. Redini, E. Gustafson, Y. Fratantonio, Y. E. Choe, C. Kruegel and G. Vigna.
ACSAC 2018 : 34th Annual Application Security Application Conference 2018.
[pdf]

Detecting Deceptive Reviews using Generative Adversarial Networks.
H. Aghakhani, Aravind Machiry, S. Nilizadeh, C. Kruegel and G. Vigna.
IEEE S&P DLS Workshop 2018 : 1st Deep Learning and Security Workshop, IEEE Security and Privacy.
[pdf]

Broken Fingers: On the Usage of the Fingerprint API in Android.
A. Bianchi, Y. Fratantonio, Aravind Machiry, C. Kruegel, G. Vigna, S. Chung, W. Lee.
NDSS 2018 : Proceedings of the ISOC Network and Distributed System Security Symposium.
[pdf]

Mechanical Phish: Resilient Autonomous Hacking.
A. Bianchi, K. Borgolte, J. Corbetta, F. Disperati, A. Dutcher, J. Grosen, P. Grosen, Aravind Machiry, C. Salls, N. Stephens, G. Vigna, R. Wang (Authors listed alphabetically).
In IEEE Security & Privacy Magazine 2018 - SPSI : Hacking without Humans.

BootStomp: On the Security of Bootloaders in Mobile Devices.
N. Redini, Aravind Machiry, D. Das, Y. Fratantonio, A. Bianchi, E. Gustafson, Y. Shoshitaishvili, C. Kruegel, G. Vigna.
34C3 : Chaos Communication Congress 2017.
[slides and talk]

DIFUZZING Android Kernel Drivers.
J. Corina, Aravind Machiry, C. Salls, Y. Shoshitaishvili, S. Hao.
BH : Black Hat Europe London, UK December, 2017.

DIFUZE: Interface Aware Fuzzing for Kernel Drivers.
J. Corina, Aravind Machiry, C. Salls, Y. Shoshitaishvili, S. Hao, C. Kruegel, and G. Vigna.
CCS 2017 : Proceedings of the 24th ACM Conference on Computer and Communications Security.
[pdf][ppt]
2017 CSAW Applied Research Competition Finalist.

DR.CHECKER: A Soundy Analysis for Linux Kernel Drivers.
Aravind Machiry, C. Spensky, J. Corina, N. Stephens, C. Kruegel, G. Vigna.
USENIX Security 2017 : Proceedings of the 26th USENIX Security Symposium.
[pdf][Press Coverage 1, 2]
2017 Internet Defense Prize Runner up.

BootStomp: On the Security of Bootloaders in Mobile Devices.
N. Redini, Aravind Machiry, D. Das, Y. Fratantonio, A. Bianchi, E. Gustafson, Y. Shoshitaishvili, C. Kruegel, G. Vigna.
USENIX Security 2017 : Proceedings of the 26th USENIX Security Symposium.
[pdf][Press Coverage 1, 2, 3, 4, and more]

BOOMERANG: Exploiting the Semantic Gap in Trusted Execution Environments.
Aravind Machiry, E. Gustafson, C. Spensky, C. Salls, N. D. Stephens, R. Wang, A. Bianchi, Y. E. Choe, C. Kruegel, G. Vigna.
NDSS 2017 : Proceedings of the ISOC Network and Distributed System Security Symposium.
[pdf][ppt]

Ramblr: Making Reassembly Great Again.
R. Wang, Y. Shoshitaishvili, A. Bianchi, Aravind Machiry, J. Grosen, P. Grosen, C. Kruegel, G. Vigna.
NDSS 2017 : Proceedings of the ISOC Network and Distributed System Security Symposium.
[pdf]
Distinguished Paper Award.

Cyber Grand Shellphish.
A. Bianchi, K. Borgolte, J. Corbetta, F. Disperati, A. Dutcher, J. Grosen, P. Grosen, Aravind Machiry, C. Salls, N. Stephens, G. Vigna, R. Wang (Authors listed alphabetically) .
PHRACK
[txt]

CLAPP: Characterizing Loops in Android Applications.
Y. Fratantonio, Aravind Machiry, A. Bianchi, C. Kruegel, G. Vigna.
FSE 2015 : ACM Symposium on Foundations of Software Engineering.
[pdf]
Best Paper Award at the UCSB Graduate Student Workshop on Computing 2016.

CLAPP: Characterizing Loops in Android Applications (Invited Talk)
Y. Fratantonio, Aravind Machiry, A. Bianchi, C. Kruegel, G. Vigna.
DeMobile 2015 : Proceedings of the International Workshop on Software Development Lifecycle for Mobile.
[pdf]

Dynodroid: An Input Generation System for Android Apps.
Aravind Machiry, Rohan Tahiliani, Mayur Naik.
FSE 2013 : ACM Symposium on Foundations of Software Engineering.
[pdf]
Distinguished Artifact Award.
Test of Time Award.