Finding semantic bugs in file systems with an extensible fuzzing framework

S Kim, M Xu, S Kashyap, J Yoon, W Xu… - Proceedings of the 27th …, 2019 - dl.acm.org
File systems are too large to be bug free. Although handwritten test suites have been widely
used to stress file systems, they can hardly keep up with the rapid increase in file system …

{FUZE}: Towards facilitating exploit generation for kernel {Use-After-Free} vulnerabilities

W Wu, Y Chen, J Xu, X Xing, X Gong… - 27th USENIX Security …, 2018 - usenix.org
Software vendors usually prioritize their bug remediation based on ease of their exploitation.
However, accurately determining exploitability typically takes tremendous hours and …

Cherivoke: Characterising pointer revocation using cheri capabilities for temporal memory safety

H Xia, J Woodruff, S Ainsworth, NW Filardo… - Proceedings of the …, 2019 - dl.acm.org
A lack of temporal safety in low-level languages has led to an epidemic of use-after-free
exploits. These have surpassed in number and severity even the infamous buffer-overflow …

GREBE: Unveiling exploitation potential for Linux kernel bugs

Z Lin, Y Chen, Y Wu, D Mu, C Yu… - 2022 IEEE Symposium …, 2022 - ieeexplore.ieee.org
Nowadays, dynamic testing tools have significantly expedited the discovery of bugs in the
Linux kernel. When unveiling kernel bugs, they automatically generate reports, specifying …

{KOOBE}: Towards facilitating exploit generation of kernel {Out-Of-Bounds} write vulnerabilities

W Chen, X Zou, G Li, Z Qian - 29th USENIX Security Symposium …, 2020 - usenix.org
The monolithic nature of modern OS kernels leads to a constant stream of bugs being
discovered. It is often unclear which of these bugs are worth fixing, as only a subset of them …

Precise and scalable detection of double-fetch bugs in OS kernels

M Xu, C Qian, K Lu, M Backes… - 2018 IEEE Symposium on …, 2018 - ieeexplore.ieee.org
During system call execution, it is common for operating system kernels to read userspace
memory multiple times (multi-reads). A critical bug may exist if the fetched userspace …

Slake: Facilitating slab manipulation for exploiting vulnerabilities in the linux kernel

Y Chen, X Xing - Proceedings of the 2019 ACM SIGSAC Conference on …, 2019 - dl.acm.org
To determine the exploitability for a kernel vulnerability, a secu-rity analyst usually has to
manipulate slab and thus demonstrate the capability of obtaining the control over a program …

[PDF][PDF] K-Miner: Uncovering Memory Corruption in Linux.

D Gens, S Schmitt, L Davi, AR Sadeghi - NDSS, 2018 - ndss-symposium.org
Operating system kernels are appealing attack targets: compromising the kernel usually
allows attackers to bypass all deployed security mechanisms and take control over the entire …

Playing for {K (H) eaps}: Understanding and improving linux kernel exploit reliability

K Zeng, Y Chen, H Cho, X Xing, A Doupé… - 31st USENIX Security …, 2022 - usenix.org
The dynamic of the Linux kernel heap layout significantly impacts the reliability of kernel
heap exploits, making exploitability assessment challenging. Though techniques have been …

{KEPLER}: Facilitating control-flow hijacking primitive evaluation for Linux kernel vulnerabilities

W Wu, Y Chen, X Xing, W Zou - 28th USENIX Security Symposium …, 2019 - usenix.org
Automatic exploit generation is a challenging problem. A challenging part of the task is to
connect an identified exploitable state (exploit primitive) to triggering execution of code …