Главная
Study mode:
on
1
Intro
2
Automatic Exploit Generation Challenge
3
Ghostscript v8.62 Bug
4
Generating Exploits
5
Unleashing Mayhem
6
How Mayhem Works: Symbolic Execution
7
Path Predicate = II
8
Safety Policy in Mayhem
9
Challenges
10
Current Resource Management in Symbolic Execution
11
Offline Execution
12
Online Execution
13
Mayhem: Hybrid Execution
14
Symbolic Indices
15
Another Cause: Table Lookups
16
Method 1: Concretization
17
Method 2: Fully Symbolic
18
Step 1 - Find Bounds
19
Step 2 - Index Search Tree Construction
20
Fully Symbolic vs. Index-based Memory Modeling Time
21
Index Search Tree Optimization: Piecewise Linear Approximation
22
Conclusion
Description:
Explore the intricacies of automatic exploit generation in binary programs through this IEEE Symposium on Security & Privacy presentation. Delve into the innovative Mayhem system, designed to uncover exploitable bugs and generate working shell-spawning exploits in executable programs without debugging information. Learn about two groundbreaking techniques: hybrid symbolic execution and index-based memory modeling, which address challenges in managing execution paths and reasoning about symbolic memory indices. Discover how Mayhem successfully identified 29 exploitable vulnerabilities across Linux and Windows programs, including two previously undocumented issues. Gain insights into the system's architecture, symbolic execution process, safety policies, and optimization techniques for efficient vulnerability detection and exploit generation in binary code.

Unleashing Mayhem on Binary Code

IEEE
Add to list
0:00 / 0:00