Combining Structured Static Code Information and Dynamic Symbolic Traces for Software Vulnerability Prediction
Deep learning (DL) has emerged as a viable means for identifying software bugs and
vulnerabilities. The success of DL relies on having a suitable representation of the problem …
vulnerabilities. The success of DL relies on having a suitable representation of the problem …
KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities
Linux kernel vulnerability reproduction is a critical task in system security. To reproduce a
kernel vulnerability, the vulnerable environment and the Proof of Concept (PoC) program …
kernel vulnerability, the vulnerable environment and the Proof of Concept (PoC) program …
Beyond Control: Exploring Novel File System Objects for Data-Only Attacks on Linux Systems
The widespread deployment of control-flow integrity has propelled non-control data attacks
into the mainstream. In the domain of OS kernel exploits, by corrupting critical non-control …
into the mainstream. In the domain of OS kernel exploits, by corrupting critical non-control …