2016 DeepFuzzTriggeringVulnerabiliti
Jump to navigation
Jump to search
- (Böttinger & Eckert, 2016) ⇒ Konstantin Böttinger, and Claudia Eckert. (2016). “DeepFuzz: Triggering Vulnerabilities Deeply Hidden in Binaries.” In: Proceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment - Volume 9721. ISBN:978-3-319-40666-4 doi:10.1007/978-3-319-40667-1_2
Subject Headings:
Notes
Cited By
- http://scholar.google.com/scholar?q=%222016%22+DeepFuzz%3A+Triggering+Vulnerabilities+Deeply+Hidden+in+Binaries
- http://dl.acm.org/citation.cfm?id=2976956.2976959&preflayout=flat#citedby
Quotes
Abstract
We introduce a new method for triggering vulnerabilities in deep layers of binary executables and facilitate their exploitation. In our approach we combine dynamic symbolic execution with fuzzing techniques. To maximize both the execution path depth and the degree of freedom in input parameters for exploitation, we define a novel method to assign probabilities to program paths. Based on this probability distribution we apply new path exploration strategies. This facilitates payload generation and therefore vulnerability exploitation.
References
;
Author | volume | Date Value | title | type | journal | titleUrl | doi | note | year | |
---|---|---|---|---|---|---|---|---|---|---|
2016 DeepFuzzTriggeringVulnerabiliti | Konstantin Böttinger Claudia Eckert | DeepFuzz: Triggering Vulnerabilities Deeply Hidden in Binaries | 10.1007/978-3-319-40667-1_2 | 2016 |