Method for exploitability estimation of program bugs
https://doi.org/10.15514/ISPRAS-2016-28(4)-8
Abstract
About the Author
A. N. FedotovRussian Federation
References
1. Miller C. et al. Crash analysis with BitBlaze. At BlackHat USA, 2010.
2. American fuzzy lop fuzer. URL: http://lcamtuf.coredump.cx/afl//.
3. Peach fuzzer. URL: http://www.peachfuzzer.com/
4. Codenomicon fuzzer. URL: http://www.codenomicon.com/
5. T. Avgerinos, S. K. Cha, Alexandre Rebert, Edard J. Schwartz, Maverick Woo, and D.Brumley. AEG: Automatic exploit generation. Commun. ACM, 2014, №2.
6. Sang Kil Cha, Thanassis Avgerinos, Alexandre Rebert and David Brumley. Unleashing MAYHEM on Binary Code. IEEE Symposium on Security and Privacy, 2012
7. Huang S. K. et al. Crax: Software crash analysis for automatic exploit generation by modeling attacks as symbolic continuations.Software Security and Reliability (SERE), 2012 IEEE Sixth International Conference on. IEEE, 2012, pp. 78-87.
8. !exploitable. URL: https://msecdbg.codeplex.com/.
9. Padaryan V.A., Kaushan V.V., Fedotov A.N.[Automated exploit generaton method for stack buffer overflow vulnerabilities]. Trudy ISP RAN/Proc. ISP RAS, vol. 26, issue 3, 2014, pp. 127-144. DOI: 10.15514/ISPRAS-2014-26(3)-7.
10. Exploitable plugin for gdb. URL: https://github.com/jfoote/exploitable.
11. Vakhrushev I. A. et al. [Search method for format string vulnerabilities]. Trudy ISP RAN/Proc. ISP RAS, vol. 27, issue 4, pp. 23-38. DOI: 10.15514/ISPRAS-2015-27(4)-2.
12. Heelan S. Automatic generation of control flow hijacking exploits for software vulnerabilities. Master’s thesis, University of Oxford, 2009.
13. Qemu. URL: http://wiki.qemu.org/Main_Page.
14. Schwartz E. J., Avgerinos T., Brumley D. Q: Exploit Hardening Made Easy //USENIX Security Symposium, pp. 25-41, 2011.
Review
For citations:
Fedotov A.N. Method for exploitability estimation of program bugs. Proceedings of the Institute for System Programming of the RAS (Proceedings of ISP RAS). 2016;28(4):137-148. (In Russ.) https://doi.org/10.15514/ISPRAS-2016-28(4)-8