0

One shot, Triple kill: Pwning all three Google kernelCTF instances with a single 1-day Linux vulnerability

Desktops, servers, cloud computing services, mobile devices, and IoT devices. Linux is the most popular open-source kernel and is used in various IT platforms. Because of the ubiquitous presence of Linux and the characteristic of the kernel which …

BaseComp: A Comparative Analysis for Integrity Protection in Cellular Baseband Software

QueryX: Symbolic Query on Decompiled Code for Finding Bugs in COTS Binaries

Fuzzing@Home: Distributed Fuzzing on Untrusted Heterogeneous Clients

DoLTEst: In-depth Downlink Negative Testing Framework for LTE Devices

HardsHeap: A Universal and Extensible Framework for Evaluating Secure Allocators

Secure allocators have been extensively studied to mitigate heap vulnerabilities. They employ safe designs and randomized mechanisms to stop or mitigate heap exploitation. Despite extensive research efforts, secure allocators can only be evaluated by …

Preventing Use-After-Free Attacks with Fast Forward Allocation

Memory-unsafe languages are widely used to implement critical systems like kernels and browsers, leading to thousands of memory safety issues every year. A use-after-free bug is a temporal memory error where the program accidentally visits a freed …

BaseSpec: Comparative Analysis of Baseband Software and Cellular Specifications for L3 Protocols

Cellular basebands play a crucial role in mobile communication. However, it is significantly challenging to assess their security for several reasons. Manual analysis is inevitable because of the obscurity and complexity of baseband firmware; …

Automatic Techniques to Systematically Discover New Heap Exploitation Primitives

Exploitation techniques to abuse metadata of heap allocators have been widely studied because of their generality (i.e., application independence) and powerfulness (i.e., bypassing modern mitigation). However, such techniques are commonly considered …

Compromising the macOS kernel through Safari by chaining six vulnerabilities

Compromising a kernel through a browser is the ultimate goal for offensive security researchers. Because of continuous efforts to eliminate vulnerabilities and introduce various mitigations, a remote kernel exploit from a browser becomes extremely …