I see dead µops: Leaking secrets via intel/amd micro-op caches
Modern Intel, AMD, and ARM processors translate complex instructions into simpler internal
micro-ops that are then cached in a dedicated on-chip structure called the micro-op cache …
micro-ops that are then cached in a dedicated on-chip structure called the micro-op cache …
{KOOBE}: Towards facilitating exploit generation of kernel {Out-Of-Bounds} write vulnerabilities
The monolithic nature of modern OS kernels leads to a constant stream of bugs being
discovered. It is often unclear which of these bugs are worth fixing, as only a subset of them …
discovered. It is often unclear which of these bugs are worth fixing, as only a subset of them …
{MAZE}: Towards automated heap feng shui
A large number of memory corruption vulnerabilities, eg, heap overflow and use after free
(UAF), could only be exploited in specific heap layouts via techniques like heap feng shui …
(UAF), could only be exploited in specific heap layouts via techniques like heap feng shui …
{D-Helix}: A Generic Decompiler Testing Framework Using Symbolic Differentiation
Decompilers, one of the widely used security tools, transform low-level binary programs
back into their high-level source representations, such as C/C++. While state-of-the-art …
back into their high-level source representations, such as C/C++. While state-of-the-art …
Playing for {K (H) eaps}: Understanding and improving linux kernel exploit reliability
The dynamic of the Linux kernel heap layout significantly impacts the reliability of kernel
heap exploits, making exploitability assessment challenging. Though techniques have been …
heap exploits, making exploitability assessment challenging. Though techniques have been …
Memory-safety challenge considered solved? An in-depth study with all Rust CVEs
Rust is an emerging programming language that aims at preventing memory-safety bugs
without sacrificing much efficiency. The claimed property is very attractive to developers, and …
without sacrificing much efficiency. The claimed property is very attractive to developers, and …
{Syzscope}: Revealing {high-risk} security impacts of {fuzzer-exposed} bugs in linux kernel
Fuzzing has become one of the most effective bug finding approach for software. In recent
years, 24* 7 continuous fuzzing platforms have emerged to test critical pieces of software …
years, 24* 7 continuous fuzzing platforms have emerged to test critical pieces of software …
Heapster: Analyzing the security of dynamic allocators for monolithic firmware images
Dynamic memory allocators are critical components of modern systems, and developers
strive to find a balance between their performance and their security. Unfortunately …
strive to find a balance between their performance and their security. Unfortunately …
Automatic techniques to systematically discover new heap exploitation primitives
Exploitation techniques to abuse metadata of heap allocators have been widely studied
because of their generality (ie, application independence) and powerfulness (ie, bypassing …
because of their generality (ie, application independence) and powerfulness (ie, bypassing …
Aem: Facilitating cross-version exploitability assessment of linux kernel vulnerabilities
This paper studies the problem of cross-version exploitability assessment for Linux kernels.
Specifically, given an exploit demonstrating the exploitability of a vulnerability on a specific …
Specifically, given an exploit demonstrating the exploitability of a vulnerability on a specific …