Secure allocators have been extensively studied to mitigate heap
vulnerabilities. They employ safe designs and randomized mechanisms to stop or
mitigate heap exploitation. Despite extensive research efforts, secure
allocators can only be evaluated by …
Memory-unsafe languages are widely used to implement critical systems like kernels and browsers, leading to thousands of memory safety issues every year. A use-after-free bug is a temporal memory error where the program accidentally visits a freed …
Cellular basebands play a crucial role in mobile communication. However, it is significantly challenging to assess their security for several reasons. Manual analysis is inevitable because of the obscurity and complexity of baseband firmware; …
Exploitation techniques to abuse metadata of heap allocators have been widely studied because of their generality (i.e., application independence) and powerfulness (i.e., bypassing modern mitigation). However, such techniques are commonly considered …
Compromising a kernel through a browser is the ultimate goal for offensive security researchers. Because of continuous efforts to eliminate vulnerabilities and introduce various mitigations, a remote kernel exploit from a browser becomes extremely …
Fuzzing is a practical, widely-deployed technique to find bugs in complex, real-world programs like JavaScript engines. We observed, however, that existing fuzzing approaches, either generative or mutational, fall short in fully harvesting …
Debugging software failures in deployed systems is important because they
impact real users and customers. However, debugging such failures is
notoriously hard in practice because developers have to rely on limited
information such as memory dumps. …
Recently, hybrid fuzzing has been proposed to address the limitations of
fuzzing and concolic execution by combining both approaches. The hybrid
approach has shown its effectiveness in various synthetic benchmarks such as
DARPA Cyber Grand Challenge …
AVPASS is a tool for leaking the detection model
of Android antivirus (AV) programs, and bypassing
the AV detection by using the leaked information
coupled with APK perturbation techniques. AVPASS
is able to infer not only the detection features, …