谷歌浏览器插件
订阅小程序
在清言上使用

Identifying Exploitable Memory Objects for Out‐of‐bound Write Vulnerabilities

Electronics Letters(2024)

引用 0|浏览2
暂无评分
摘要
Abstract Exploiting an out‐of‐bounds write vulnerability in general‐purpose applications has become a current research focus. Given the large scale of code in programs, selecting appropriate memory objects for exploitation is challenging. This letter proposes a corrupted data propagation‐guided fuzzing method. By tracking the propagation process of corrupted data among memory objects, a multi‐level fuzzing schedule is proposed to search the execution paths. Experimental results show that this proposed method, EMOFuzz, can effectively identify exploitable objects under various overflow lengths, significantly enhancing the efficiency of exploitability analysis.
更多
查看译文
关键词
computer network security,information and communications
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要