A Survey on Software Vulnerability Exploitability Assessment
S Elder, MR Rahman, G Fringer, K Kapoor… - ACM Computing …, 2024 - dl.acm.org
Knowing the exploitability and severity of software vulnerabilities helps practitioners
prioritize vulnerability mitigation efforts. Researchers have proposed and evaluated many …
prioritize vulnerability mitigation efforts. Researchers have proposed and evaluated many …
A review of machine learning applications in fuzzing
GJ Saavedra, KN Rodhouse, DM Dunlavy… - arXiv preprint arXiv …, 2019 - arxiv.org
Fuzzing has played an important role in improving software development and testing over
the course of several decades. Recent research in fuzzing has focused on applications of …
the course of several decades. Recent research in fuzzing has focused on applications of …
GREBE: Unveiling exploitation potential for Linux kernel bugs
Nowadays, dynamic testing tools have significantly expedited the discovery of bugs in the
Linux kernel. When unveiling kernel bugs, they automatically generate reports, specifying …
Linux kernel. When unveiling kernel bugs, they automatically generate reports, specifying …
{KOOBE}: Towards facilitating exploit generation of kernel {Out-Of-Bounds} write vulnerabilities
The monolithic nature of modern OS kernels leads to a constant stream of bugs being
discovered. It is often unclear which of these bugs are worth fixing, as only a subset of them …
discovered. It is often unclear which of these bugs are worth fixing, as only a subset of them …
{MAZE}: Towards automated heap feng shui
A large number of memory corruption vulnerabilities, eg, heap overflow and use after free
(UAF), could only be exploited in specific heap layouts via techniques like heap feng shui …
(UAF), could only be exploited in specific heap layouts via techniques like heap feng shui …
Slake: Facilitating slab manipulation for exploiting vulnerabilities in the linux kernel
To determine the exploitability for a kernel vulnerability, a secu-rity analyst usually has to
manipulate slab and thus demonstrate the capability of obtaining the control over a program …
manipulate slab and thus demonstrate the capability of obtaining the control over a program …
Playing for {K (H) eaps}: Understanding and improving linux kernel exploit reliability
The dynamic of the Linux kernel heap layout significantly impacts the reliability of kernel
heap exploits, making exploitability assessment challenging. Though techniques have been …
heap exploits, making exploitability assessment challenging. Though techniques have been …
{KEPLER}: Facilitating control-flow hijacking primitive evaluation for Linux kernel vulnerabilities
Automatic exploit generation is a challenging problem. A challenging part of the task is to
connect an identified exploitable state (exploit primitive) to triggering execution of code …
connect an identified exploitable state (exploit primitive) to triggering execution of code …
A systematic study of elastic objects in kernel exploitation
Recent research has proposed various methods to perform kernel exploitation and bypass
kernel protection. For example, security researchers have demonstrated an exploitation …
kernel protection. For example, security researchers have demonstrated an exploitation …
{HeapHopper}: Bringing bounded model checking to heap implementation security
Heap metadata attacks have become one of the primary ways in which attackers exploit
memory corruption vulnerabilities. While heap implementation developers have introduced …
memory corruption vulnerabilities. While heap implementation developers have introduced …