There is a newer version of the record available.

Published January 25, 2025 | Version v1
Software Open

FIXX: FInding eXploits from eXamples

  • 1. ROR icon University of Illinois Chicago
  • 2. EDMO icon University of Illinois at Chicago
  • 3. ROR icon Oracle (United States)

Description

FInding eXploits from eXamples is a novel approach focused on detecting taint-style vulnerabilities in PHP applications. Using important information from a CVE containing details regarding a vulnerability in an application, our method aims to discover possible similar vulnerabilities in the corresponding application. This artifact contains the required source code to detect such vulnerabilities in a given web application. The list of PHP applications that have been evaluated using our approach has been provided here as well. Additionally, the dumpfiles needed to load the code property graphs of the corresponding applications have been provided. Finally, FIXX obtains important information regarding the vulnerability of an application from its CVE using a fine-tuned GPT4 model. The dataset used to fine-tune this model has been uploaded as well. 

Files

FIXX_USENIX_2025.zip

Files (424.3 MB)

Name Size Download all
md5:2e286e1872e7c7555aedc8b79771e516
424.3 MB Preview Download

Additional details

Funding

Defense Advanced Research Projects Agency
Computers and Humans Exploring Software Security (CHESS) FA8750-19-C-0006
United States Department of Defense
Educational and Research Training Collaborative HQ00342010037