A Survey on Software Vulnerability Exploitability Assessment

S Elder, MR Rahman, G Fringer, K Kapoor… - ACM Computing …, 2024 - dl.acm.org
Knowing the exploitability and severity of software vulnerabilities helps practitioners
prioritize vulnerability mitigation efforts. Researchers have proposed and evaluated many …

A review of machine learning applications in fuzzing

GJ Saavedra, KN Rodhouse, DM Dunlavy… - arXiv preprint arXiv …, 2019 - arxiv.org
Fuzzing has played an important role in improving software development and testing over
the course of several decades. Recent research in fuzzing has focused on applications of …

GREBE: Unveiling exploitation potential for Linux kernel bugs

Z Lin, Y Chen, Y Wu, D Mu, C Yu… - 2022 IEEE Symposium …, 2022 - ieeexplore.ieee.org
Nowadays, dynamic testing tools have significantly expedited the discovery of bugs in the
Linux kernel. When unveiling kernel bugs, they automatically generate reports, specifying …

{KOOBE}: Towards facilitating exploit generation of kernel {Out-Of-Bounds} write vulnerabilities

W Chen, X Zou, G Li, Z Qian - 29th USENIX Security Symposium …, 2020 - usenix.org
The monolithic nature of modern OS kernels leads to a constant stream of bugs being
discovered. It is often unclear which of these bugs are worth fixing, as only a subset of them …

{MAZE}: Towards automated heap feng shui

Y Wang, C Zhang, Z Zhao, B Zhang, X Gong… - 30th USENIX Security …, 2021 - usenix.org
A large number of memory corruption vulnerabilities, eg, heap overflow and use after free
(UAF), could only be exploited in specific heap layouts via techniques like heap feng shui …

Slake: Facilitating slab manipulation for exploiting vulnerabilities in the linux kernel

Y Chen, X Xing - Proceedings of the 2019 ACM SIGSAC Conference on …, 2019 - dl.acm.org
To determine the exploitability for a kernel vulnerability, a secu-rity analyst usually has to
manipulate slab and thus demonstrate the capability of obtaining the control over a program …

Playing for {K (H) eaps}: Understanding and improving linux kernel exploit reliability

K Zeng, Y Chen, H Cho, X Xing, A Doupé… - 31st USENIX Security …, 2022 - usenix.org
The dynamic of the Linux kernel heap layout significantly impacts the reliability of kernel
heap exploits, making exploitability assessment challenging. Though techniques have been …

{KEPLER}: Facilitating control-flow hijacking primitive evaluation for Linux kernel vulnerabilities

W Wu, Y Chen, X Xing, W Zou - 28th USENIX Security Symposium …, 2019 - usenix.org
Automatic exploit generation is a challenging problem. A challenging part of the task is to
connect an identified exploitable state (exploit primitive) to triggering execution of code …

A systematic study of elastic objects in kernel exploitation

Y Chen, Z Lin, X Xing - Proceedings of the 2020 ACM SIGSAC …, 2020 - dl.acm.org
Recent research has proposed various methods to perform kernel exploitation and bypass
kernel protection. For example, security researchers have demonstrated an exploitation …

{HeapHopper}: Bringing bounded model checking to heap implementation security

M Eckert, A Bianchi, R Wang, Y Shoshitaishvili… - 27th USENIX Security …, 2018 - usenix.org
Heap metadata attacks have become one of the primary ways in which attackers exploit
memory corruption vulnerabilities. While heap implementation developers have introduced …