Automatic exploit generation

Thanassis Avgerinos, Sang Kil Cha, Alexandre Rebert, Edward J. Schwartz, Maverick Woo, David Brumley
[doi] [Google Scholar] [DBLP] [Citeseer] [url]

Communications of the ACM 57(2)
Association for Computing Machinery
New York, NY, USA
Pages 74-84
February 2014
Note(s): Automatic Exploit Generation, KLEE verifier, symbolic execution
Papers: heelan:msc:2009, heelan:sec:2018

Automatic exploit generation, Symbolic execution

  • Automatic generation of control flow hijacking exploits for software vulnerabilities [heelan:msc:2009]
  • Automatic heap layout manipulation for exploitation [heelan:sec:2018]