I see dead µops: Leaking secrets via intel/amd micro-op caches

X Ren, L Moody, M Taram, M Jordan… - 2021 ACM/IEEE 48th …, 2021 - ieeexplore.ieee.org
Modern Intel, AMD, and ARM processors translate complex instructions into simpler internal
micro-ops that are then cached in a dedicated on-chip structure called the micro-op cache …

{KOOBE}: Towards facilitating exploit generation of kernel {Out-Of-Bounds} write vulnerabilities

W Chen, X Zou, G Li, Z Qian - 29th USENIX Security Symposium …, 2020 - usenix.org
The monolithic nature of modern OS kernels leads to a constant stream of bugs being
discovered. It is often unclear which of these bugs are worth fixing, as only a subset of them …

{MAZE}: Towards automated heap feng shui

Y Wang, C Zhang, Z Zhao, B Zhang, X Gong… - 30th USENIX Security …, 2021 - usenix.org
A large number of memory corruption vulnerabilities, eg, heap overflow and use after free
(UAF), could only be exploited in specific heap layouts via techniques like heap feng shui …

{D-Helix}: A Generic Decompiler Testing Framework Using Symbolic Differentiation

M Zou, A Khan, R Wu, H Gao, A Bianchi… - 33rd USENIX Security …, 2024 - usenix.org
Decompilers, one of the widely used security tools, transform low-level binary programs
back into their high-level source representations, such as C/C++. While state-of-the-art …

Playing for {K (H) eaps}: Understanding and improving linux kernel exploit reliability

K Zeng, Y Chen, H Cho, X **ng, A Doupé… - 31st USENIX Security …, 2022 - usenix.org
The dynamic of the Linux kernel heap layout significantly impacts the reliability of kernel
heap exploits, making exploitability assessment challenging. Though techniques have been …

Memory-safety challenge considered solved? An in-depth study with all Rust CVEs

H Xu, Z Chen, M Sun, Y Zhou, MR Lyu - ACM Transactions on Software …, 2021 - dl.acm.org
Rust is an emerging programming language that aims at preventing memory-safety bugs
without sacrificing much efficiency. The claimed property is very attractive to developers, and …

{Syzscope}: Revealing {high-risk} security impacts of {fuzzer-exposed} bugs in linux kernel

X Zou, G Li, W Chen, H Zhang, Z Qian - 31st USENIX Security …, 2022 - usenix.org
Fuzzing has become one of the most effective bug finding approach for software. In recent
years, 24* 7 continuous fuzzing platforms have emerged to test critical pieces of software …

Heapster: Analyzing the security of dynamic allocators for monolithic firmware images

F Gritti, F Pagani, I Grishchenko… - … IEEE Symposium on …, 2022 - ieeexplore.ieee.org
Dynamic memory allocators are critical components of modern systems, and developers
strive to find a balance between their performance and their security. Unfortunately …

Automatic techniques to systematically discover new heap exploitation primitives

I Yun, D Kapil, T Kim - … USENIX Security Symposium (USENIX Security 20 …, 2020 - usenix.org
Exploitation techniques to abuse metadata of heap allocators have been widely studied
because of their generality (ie, application independence) and powerfulness (ie, bypassing …

Aem: Facilitating cross-version exploitability assessment of linux kernel vulnerabilities

Z Jiang, Y Zhang, J Xu, X Sun, Z Liu… - 2023 IEEE Symposium …, 2023 - ieeexplore.ieee.org
This paper studies the problem of cross-version exploitability assessment for Linux kernels.
Specifically, given an exploit demonstrating the exploitability of a vulnerability on a specific …