HAEPG: An Automatic Multi-hop Exploitation Generation Framework
暂无分享,去创建一个
[1] David Brumley,et al. AEG: Automatic Exploit Generation , 2011, NDSS.
[2] Christopher Krügel,et al. HeapHopper: Bringing Bounded Model Checking to Heap Implementation Security , 2018, USENIX Security Symposium.
[3] Daniel Kroening,et al. MSc Computer Science Dissertation Automatic Generation of Control Flow Hijacking Exploits for Software Vulnerabilities , 2009 .
[4] Daniel Kroening,et al. Automatic Heap Layout Manipulation for Exploitation , 2018, USENIX Security Symposium.
[5] Yueqi Chen,et al. SLAKE: Facilitating Slab Manipulation for Exploiting Vulnerabilities in the Linux Kernel , 2019, CCS.
[6] Daniel Kroening,et al. Gollum: Modular and Greybox Exploit Generation for Heap Overflows in Interpreters , 2019, CCS.
[7] Taesoo Kim,et al. Automatic Techniques to Systematically Discover New Heap Exploitation Primitives , 2020, USENIX Security Symposium.
[8] Wei Wu,et al. FUZE: Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities , 2018, USENIX Security Symposium.
[9] George Candea,et al. S2E: a platform for in-vivo multi-path analysis of software systems , 2011, ASPLOS XVI.
[10] Giovanni Vigna,et al. Mechanical Phish: Resilient Autonomous Hacking , 2018, IEEE Security & Privacy.
[11] Christopher Krügel,et al. SOK: (State of) The Art of War: Offensive Techniques in Binary Analysis , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[12] Christopher Krügel,et al. Driller: Augmenting Fuzzing Through Selective Symbolic Execution , 2016, NDSS.
[13] Shih-Kun Huang,et al. CRAX: Software Crash Analysis for Automatic Exploit Generation by Modeling Attacks as Symbolic Continuations , 2012, 2012 IEEE Sixth International Conference on Software Security and Reliability.
[14] David Brumley,et al. Unleashing Mayhem on Binary Code , 2012, 2012 IEEE Symposium on Security and Privacy.
[15] Chao Zhang,et al. Revery: From Proof-of-Concept to Exploitable , 2018, CCS.