Z Jiang, Y Zhang, J Xu, X Sun, Z Liu… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
This paper studies the problem of cross-version exploitability assessment for Linux kernels. Specifically, given an exploit demonstrating the exploitability of a vulnerability on a specific …
C Guthoff, S Anell, J Hainzinger… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Key management is an integral part of using distributed ledger technology (DLT). Previous work has primarily focused on key management for single-user scenarios on Bitcoin. Over …
In this work, we explore novel virtualization-assisted techniques to further enhance their capacity with regard to security. Specifically, we position our research around two main …
Recent research endeavors have explored various methods to perform kernel exploitation and bypass kernel protection and exploitation mitigation. However, these efforts primarily …
Software vendors usually prioritize their bug remediation based on ease of their exploitation. However, accurately determining exploitability typically takes tremendous hours and …