USENIX Security '18 - Automatic Heap Layout Manipulation for Exploitation

USENIX Security '20 - Automatic Techniques to Systematically Discover New Heap ExploitationПодробнее

USENIX Security '20 - Automatic Techniques to Systematically Discover New Heap Exploitation

Heap Layout Optimisation for ExploitationПодробнее

Heap Layout Optimisation for Exploitation

USENIX Security '21 - MAZE: Towards Automated Heap Feng ShuiПодробнее

USENIX Security '21 - MAZE: Towards Automated Heap Feng Shui

USENIX Security '18-Inception: System-Wide Security Testing of Real-World Embedded Systems SoftwareПодробнее

USENIX Security '18-Inception: System-Wide Security Testing of Real-World Embedded Systems Software

USENIX Security '18 - Automatic Heap Layout Manipulation for ExploitationПодробнее

USENIX Security '18 - Automatic Heap Layout Manipulation for Exploitation

USENIX Security '18 - NAVEX: Precise and Scalable Exploit Generation for Dynamic Web ApplicationsПодробнее

USENIX Security '18 - NAVEX: Precise and Scalable Exploit Generation for Dynamic Web Applications

USENIX Security '23 - Automated Exploitable Heap Layout Generation for Heap Overflows Through...Подробнее

USENIX Security '23 - Automated Exploitable Heap Layout Generation for Heap Overflows Through...

USENIX Security '18 - HeapHopper: Bringing Bounded Model Checking to Heap Implementation SecurityПодробнее

USENIX Security '18 - HeapHopper: Bringing Bounded Model Checking to Heap Implementation Security

Automatic heap layout manipulationПодробнее

Automatic heap layout manipulation

USENIX Security '18 - Off-Path TCP Exploit: How Wireless Routers Can Jeopardize Your SecretsПодробнее

USENIX Security '18 - Off-Path TCP Exploit: How Wireless Routers Can Jeopardize Your Secrets

Thaís Moreira Hamasaki - The (not so profitable) Path towards Automated Heap ExploitationПодробнее

Thaís Moreira Hamasaki - The (not so profitable) Path towards Automated Heap Exploitation

USENIX Security '22 - Ferry: State-Aware Symbolic Execution for Exploring State-Dependent ProgramПодробнее

USENIX Security '22 - Ferry: State-Aware Symbolic Execution for Exploring State-Dependent Program

USENIX Security '18 - Understanding the Reproducibility of Crowd-reported Security VulnerabilitiesПодробнее

USENIX Security '18 - Understanding the Reproducibility of Crowd-reported Security Vulnerabilities

USENIX Security '18 - Charm: Facilitating Dynamic Analysis of Device Drivers of Mobile SystemsПодробнее

USENIX Security '18 - Charm: Facilitating Dynamic Analysis of Device Drivers of Mobile Systems

Heap exploitation with hands-on exercices! Presented by @alxbl_secПодробнее

Heap exploitation with hands-on exercices! Presented by @alxbl_sec

USENIX Security '18 - The Battle for New York: A Case Study of Applied Digital Threat Modeling...Подробнее

USENIX Security '18 - The Battle for New York: A Case Study of Applied Digital Threat Modeling...

USENIX Security '17 - Towards Efficient Heap Overflow DiscoveryПодробнее

USENIX Security '17 - Towards Efficient Heap Overflow Discovery

RuhrSec 2019: "Greybox Automatic Exploit Generation for Heap Overflows", Sean HeelanПодробнее

RuhrSec 2019: 'Greybox Automatic Exploit Generation for Heap Overflows', Sean Heelan