Locating vulnerabilities in binaries via memory layout recovering
Locating vulnerabilities is an important task for security auditing, exploit writing, and code hardening. However, it is challenging to locate vulnerabilities in binary code, because most program semantics (e.g., boundaries of an array) is missing after compilation. Without program semantics, it is...
Saved in:
Main Authors: | WANG, Haijun, XIE, Xiaofei, LIN, Shang-Wei, LIN, Yun, LI, Yuekang, QIN, Shengchao, LIU, Yang, LIU, Ting |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2019
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/7066 https://ink.library.smu.edu.sg/context/sis_research/article/8069/viewcontent/3338906.3338966.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Cerebro: Context-aware adaptive fuzzing for effective vulnerability detection
by: LI, Yuekang, et al.
Published: (2019) -
MemLock: Memory usage guided fuzzing
by: WEN, Cheng, et al.
Published: (2020) -
Typestate-guided fuzzer for discovering use-after-free vulnerabilities
by: WANG, Haijun, et al.
Published: (2020) -
Software composition analysis for vulnerability detection: An empirical study on Java projects
by: ZHAO, Lida, et al.
Published: (2023) -
SoFi: Reflection-augmented fuzzing for JavaScript engines
by: HE, Xiaoyu, et al.
Published: (2021)