Systematically understanding the cyber attack business: A survey

K Huang, M Siegel, S Madnick - ACM Computing Surveys (CSUR), 2018 - dl.acm.org
Cyber attacks are increasingly menacing businesses. Based on the literature review and
publicly available reports, this article conducts an extensive and consistent survey of the …

Challenges in firmware re-hosting, emulation, and analysis

C Wright, WA Moeglein, S Bagchi, M Kulkarni… - ACM Computing …, 2021 - dl.acm.org
System emulation and firmware re-hosting have become popular techniques to answer
various security and performance related questions, such as determining whether a …

{QSYM}: A practical concolic execution engine tailored for hybrid fuzzing

I Yun, S Lee, M Xu, Y Jang, T Kim - 27th USENIX Security Symposium …, 2018 - usenix.org
Recently, hybrid fuzzing has been proposed to address the limitations of fuzzing and
concolic execution by combining both approaches. The hybrid approach has shown its …

T-Fuzz: fuzzing by program transformation

H Peng, Y Shoshitaishvili… - 2018 IEEE Symposium on …, 2018 - ieeexplore.ieee.org
Fuzzing is a simple yet effective approach to discover software bugs utilizing randomly
generated inputs. However, it is limited by coverage and cannot find bugs hidden in deep …

ExploitGen: Template-augmented exploit code generation based on CodeBERT

G Yang, Y Zhou, X Chen, X Zhang, T Han… - Journal of Systems and …, 2023 - Elsevier
Exploit code is widely used for detecting vulnerabilities and implementing defensive
measures. However, automatic generation of exploit code for security assessment is a …

{FUZE}: Towards facilitating exploit generation for kernel {Use-After-Free} vulnerabilities

W Wu, Y Chen, J Xu, X Xing, X Gong… - 27th USENIX Security …, 2018 - usenix.org
Software vendors usually prioritize their bug remediation based on ease of their exploitation.
However, accurately determining exploitability typically takes tremendous hours and …

Dualsc: Automatic generation and summarization of shellcode via transformer and dual learning

G Yang, X Chen, Y Zhou, C Yu - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
A shellcode is a small piece of code and it is executed to exploit a software vulnerability,
which allows the target computer to execute arbitrary commands from the attacker through a …

GREBE: Unveiling exploitation potential for Linux kernel bugs

Z Lin, Y Chen, Y Wu, D Mu, C Yu… - 2022 IEEE Symposium …, 2022 - ieeexplore.ieee.org
Nowadays, dynamic testing tools have significantly expedited the discovery of bugs in the
Linux kernel. When unveiling kernel bugs, they automatically generate reports, specifying …

{KOOBE}: Towards facilitating exploit generation of kernel {Out-Of-Bounds} write vulnerabilities

W Chen, X Zou, G Li, Z Qian - 29th USENIX Security Symposium …, 2020 - usenix.org
The monolithic nature of modern OS kernels leads to a constant stream of bugs being
discovered. It is often unclear which of these bugs are worth fixing, as only a subset of them …

Slake: Facilitating slab manipulation for exploiting vulnerabilities in the linux kernel

Y Chen, X Xing - Proceedings of the 2019 ACM SIGSAC Conference on …, 2019 - dl.acm.org
To determine the exploitability for a kernel vulnerability, a secu-rity analyst usually has to
manipulate slab and thus demonstrate the capability of obtaining the control over a program …