System emulation and firmware re-hosting have become popular techniques to answer various security and performance related questions, such as determining whether a …
I Yun, S Lee, M Xu, Y Jang, T Kim - 27th USENIX Security Symposium …, 2018 - usenix.org
Recently, hybrid fuzzing has been proposed to address the limitations of fuzzing and concolic execution by combining both approaches. The hybrid approach has shown its …
H Peng, Y Shoshitaishvili… - 2018 IEEE Symposium on …, 2018 - ieeexplore.ieee.org
Fuzzing is a simple yet effective approach to discover software bugs utilizing randomly generated inputs. However, it is limited by coverage and cannot find bugs hidden in deep …
Exploit code is widely used for detecting vulnerabilities and implementing defensive measures. However, automatic generation of exploit code for security assessment is a …
W Wu, Y Chen, J Xu, X Xing, X Gong… - 27th USENIX Security …, 2018 - usenix.org
Software vendors usually prioritize their bug remediation based on ease of their exploitation. However, accurately determining exploitability typically takes tremendous hours and …
G Yang, X Chen, Y Zhou, C Yu - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
A shellcode is a small piece of code and it is executed to exploit a software vulnerability, which allows the target computer to execute arbitrary commands from the attacker through a …
Z Lin, Y Chen, Y Wu, D Mu, C Yu… - 2022 IEEE Symposium …, 2022 - ieeexplore.ieee.org
Nowadays, dynamic testing tools have significantly expedited the discovery of bugs in the Linux kernel. When unveiling kernel bugs, they automatically generate reports, specifying …
The monolithic nature of modern OS kernels leads to a constant stream of bugs being discovered. It is often unclear which of these bugs are worth fixing, as only a subset of them …
Y Chen, X Xing - Proceedings of the 2019 ACM SIGSAC Conference on …, 2019 - dl.acm.org
To determine the exploitability for a kernel vulnerability, a secu-rity analyst usually has to manipulate slab and thus demonstrate the capability of obtaining the control over a program …