A systematic study of elastic objects in kernel exploitation

Y Chen, Z Lin, X Xing - Proceedings of the 2020 ACM SIGSAC …, 2020 - dl.acm.org
Recent research has proposed various methods to perform kernel exploitation and bypass
kernel protection. For example, security researchers have demonstrated an exploitation …

Aem: Facilitating cross-version exploitability assessment of linux kernel vulnerabilities

Z Jiang, Y Zhang, J Xu, X Sun, Z Liu… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
This paper studies the problem of cross-version exploitability assessment for Linux kernels.
Specifically, given an exploit demonstrating the exploitability of a vulnerability on a specific …

Perceptions of distributed ledger technology key management-an interview study with finance professionals

C Guthoff, S Anell, J Hainzinger… - … IEEE Symposium on …, 2023 - ieeexplore.ieee.org
Key management is an integral part of using distributed ledger technology (DLT). Previous
work has primarily focused on key management for single-user scenarios on Bitcoin. Over …

Virtualization-assisted Dynamic Binary Analysis and Operating System Security

S Proskurin - 2022 - mediatum.ub.tum.de
In this work, we explore novel virtualization-assisted techniques to further enhance their
capacity with regard to security. Specifically, we position our research around two main …

Increasing Exploitability via Elastic Kernel Objects

Z Lin - 2022 - etda.libraries.psu.edu
Recent research endeavors have explored various methods to perform kernel exploitation
and bypass kernel protection and exploitation mitigation. However, these efforts primarily …

[PDF][PDF] From Thousands of Hours to a Couple of Minutes: Towards Automating Exploit Generation for Arbitrary Types of Kernel Vulnerabilities

W Wu, X Xing, J Su - i.blackhat.com
Software vendors usually prioritize their bug remediation based on ease of their exploitation.
However, accurately determining exploitability typically takes tremendous hours and …