Главная
Study mode:
on
1
Intro
2
Background (cont.)
3
Crafting an Exploit for Kernel Use-After-Free
4
Needs Intensive Manual Efforts
5
Needs Extensive Expertise in Kernel
6
Needs Security Expertise
7
Some Past Research Potentially Tackling the Challenges
8
A Real World Example (CVE-2017-15649)
9
No Primitive Needed for Exploitation
10
Roadmap
11
FUZE - Extracting Critical Info.
12
FUZE - Performing Kernel Fuzzing
13
FUZE - Performing Symbolic Execution
14
Useful primitive identification
15
Case Study (cont)
16
Discussion on Failure Cases
17
Conclusion
18
Questions
19
THE ADVANCED COMPUTING SYSTEMS ASSOCIATION
Description:
Explore a conference talk on FUZE, a framework designed to facilitate exploit generation for kernel Use-After-Free (UAF) vulnerabilities. Delve into the challenges of accurately determining exploitability and the need for automated techniques. Learn how FUZE combines kernel fuzzing with symbolic execution to identify and analyze system calls useful for kernel UAF exploitation. Discover the framework's implementation on a 64-bit Linux system and its effectiveness in escalating exploitability and diversifying working exploits for 15 real-world kernel UAF vulnerabilities. Gain insights into how FUZE can aid in security mitigation bypassing and make exploitability evaluation more efficient and less labor-intensive.

FUZE - Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities

USENIX
Add to list