A systematic study of elastic objects in kernel exploitation
Recent research has proposed various methods to perform kernel exploitation and bypass
kernel protection. For example, security researchers have demonstrated an exploitation …
kernel protection. For example, security researchers have demonstrated an exploitation …
Aem: Facilitating cross-version exploitability assessment of linux kernel vulnerabilities
This paper studies the problem of cross-version exploitability assessment for Linux kernels.
Specifically, given an exploit demonstrating the exploitability of a vulnerability on a specific …
Specifically, given an exploit demonstrating the exploitability of a vulnerability on a specific …
Perceptions of distributed ledger technology key management-an interview study with finance professionals
Key management is an integral part of using distributed ledger technology (DLT). Previous
work has primarily focused on key management for single-user scenarios on Bitcoin. Over …
work has primarily focused on key management for single-user scenarios on Bitcoin. Over …
Virtualization-assisted Dynamic Binary Analysis and Operating System Security
S Proskurin - 2022 - mediatum.ub.tum.de
In this work, we explore novel virtualization-assisted techniques to further enhance their
capacity with regard to security. Specifically, we position our research around two main …
capacity with regard to security. Specifically, we position our research around two main …
Increasing Exploitability via Elastic Kernel Objects
Z Lin - 2022 - etda.libraries.psu.edu
Recent research endeavors have explored various methods to perform kernel exploitation
and bypass kernel protection and exploitation mitigation. However, these efforts primarily …
and bypass kernel protection and exploitation mitigation. However, these efforts primarily …
[PDF][PDF] From Thousands of Hours to a Couple of Minutes: Towards Automating Exploit Generation for Arbitrary Types of Kernel Vulnerabilities
W Wu, X Xing, J Su - i.blackhat.com
Software vendors usually prioritize their bug remediation based on ease of their exploitation.
However, accurately determining exploitability typically takes tremendous hours and …
However, accurately determining exploitability typically takes tremendous hours and …