Combining Structured Static Code Information and Dynamic Symbolic Traces for Software Vulnerability Prediction

H Wang, Z Tang, SH Tan, J Wang, Y Liu… - Proceedings of the …, 2024 - dl.acm.org
Deep learning (DL) has emerged as a viable means for identifying software bugs and
vulnerabilities. The success of DL relies on having a suitable representation of the problem …

KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities

B Ruan, J Liu, C Zhang, Z Liang - arXiv preprint arXiv:2404.11107, 2024 - arxiv.org
Linux kernel vulnerability reproduction is a critical task in system security. To reproduce a
kernel vulnerability, the vulnerable environment and the Proof of Concept (PoC) program …

Beyond Control: Exploring Novel File System Objects for Data-Only Attacks on Linux Systems

J Zhou, J Hu, Z Pan, J Zhu, G Li, W Shen, Y Sui… - arXiv preprint arXiv …, 2024 - arxiv.org
The widespread deployment of control-flow integrity has propelled non-control data attacks
into the mainstream. In the domain of OS kernel exploits, by corrupting critical non-control …