1 |
CHEN Y Q, XING X Y. SLAKE: facilitating slab manipulation for exploiting vulnerabilities in the Linux kernel[C]//Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. New York, USA: ACM Press, 2019: 1707-1722.
|
2 |
刘剑, 苏璞睿, 杨珉, 等. 软件与网络安全研究综述. 软件学报, 2018, 29 (1): 42- 68.
|
|
LIU J , SU P R , YANG M , et al. Software and cyber security-a survey. Journal of Software, 2018, 29 (1): 42- 68.
|
3 |
KEMERLIS V P, POLYCHRONAKIS M, KEROMYTIS A D. Ret2dir: rethinking kernel isolation[C]//Proceedings of the 23rd USENIX Conference on Security Symposium. New York, USA: ACM Press, 2014: 957-972.
|
4 |
|
5 |
|
6 |
KEMERLIS V P, PORTOKALIDIS G, KEROMYTIS A D. kGuard: lightweight kernel protection against return-to-user attacks[C]//Proceedings of the 21st USENIX Conference on Security Symposium. New York, USA: ACM Press, 2012: 459-474.
|
7 |
XU W, LI J R, SHU J L, et al. From collision to exploitation: unleashing use-after-free vulnerabilities in Linux kernel[C]//Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. New York, USA: ACM Press, 2015: 414-425.
|
8 |
LIN Z, WU Y, XING X. Dirtycred: escalating privilege in Linux kernel[C]//Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. New York, USA: ACM Press, 2022: 1963-1976.
|
9 |
AVGERINOS T , CHA S K , REBERT A , et al. Automatic exploit generation. Communications of the ACM, 2014, 57 (2): 74- 84.
doi: 10.1145/2560217.2560219
|
10 |
赵尚儒, 李学俊, 方越, 等. 安全漏洞自动利用综述. 计算机研究与发展, 2019, 56 (10): 2097- 2111.
|
|
ZHAO S R , LI X J , FANG Y , et al. A survey on automated exploit generation. Journal of Computer Research and Development, 2019, 56 (10): 2097- 2111.
|
11 |
冯光升, 张熠哲, 孙嘉钰, 等. 计算机系统漏洞自动化利用研究关键技术及进展. 信息网络安全, 2022, 22 (3): 39- 52.
|
|
FENG G S , ZHANG Y Z , SUN J Y , et al. Key technologies and advances in the research on automated exploitation of computer system vulnerabilities. Netinfo Security, 2022, 22 (3): 39- 52.
|
12 |
张利群, 潘祖烈, 黄晖, 等. 基于符号执行的Tcache Poisoning堆漏洞自动验证方法研究. 计算机工程, 2023, 49 (6): 24- 33.
URL
|
|
ZHANG L Q , PAN Z L , HUANG H , et al. Research on automatic verification method of Tcache Poisoning heap vulnerability based on symbolic execution. Computer Engineering, 2023, 49 (6): 24- 33.
URL
|
13 |
WU W, CHEN Y Q, XU J, et al. FUZE: towards facilitating exploit generation for kernel use-after-free vulnerabilities[C]//Proceedings of the 27th USENIX Conference on Security Symposium. New York, USA: ACM Press, 2018: 781-797.
|
14 |
CHEN W T, ZOU X C, LI G R, et al. KOOBE: towards facilitating exploit generation of kernel out-of-bounds write vulnerabilities[C]//Proceedings of the 29th Conference on USENIX Security Symposium (USENIX Security 20). New York, USA: ACM Press, 2020: 1093-1110.
|
15 |
|
16 |
CHO H, PARK J, KANG J, et al. Exploiting uses of uninitialized stack variables in Linux kernels to leak kernel pointers[C]//Proceedings of the 14th USENIX Workshop on Offensive Technologies. New York, USA: ACM Press, 2020: 123-129.
|
17 |
LIU D J , WANG P F , ZHOU X , et al. ERACE: toward facilitating exploit generation for kernel race vulnerabilities. Applied Sciences, 2022, 12 (23): 11925.
doi: 10.3390/app122311925
|
18 |
LEE Y, MIN C, LEE B. ExpRace: exploiting kernel races through raising interrupts[C]//Proceedings of the 30th USENIX Conference on Security Symposium. New York, USA: ACM Press, 2021: 2363-2380.
|
19 |
LIN Z, CHEN Y, WU Y, et al. Grebe: unveiling exploitation potential for linux kernel bugs[C]//Proceedings of IEEE Symposium on Security and Privacy. Washington D. C., USA: IEEE Press, 2022: 2078-2095.
|
20 |
ZOU X C, LI G R, CHEN W T, et al. SyzScope: revealing high-risk security impacts of fuzzer-exposed bugs in Linux kernel[C]//Proceedings of the 31st USENIX Conference on Security Symposium. New York, USA: ACM Press, 2022: 3201-3217.
|
21 |
WU W, CHEN Y Q, XING X Y, et al. KEPLER: facilitating control-flow hijacking primitive evaluation for Linux kernel vulnerabilities[C]//Proceedings of the 28th USENIX Security Symposium. New York, USA: ACM Press, 2019: 1187-1204.
|
22 |
ZENG K, CHEN Y, CHO H, et al. Playing for K (H) eaps: understanding and improving Linux kernel exploit reliability[C]//Proceedings of the 31st USENIX Security Symposium. New York, USA: ACM Press, 2022: 71-88.
|
23 |
LEE Y, KWAK J, KANG J, et al. Pspray: timing side-channel based Linux kernel heap exploitation technique[C]//Proceedings of the 32nd USENIX Security Symposium. New York, USA: ACM Press, 2023: 6825-6842.
|
24 |
CHEN Y Q, LIN Z P, XING X Y. A systematic study of elastic objects in kernel exploitation[C]//Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. New York, USA: ACM Press, 2020: 1165-1184.
|
25 |
LIU D , WANG P , ZHOU X , et al. From release to rebirth: exploiting Thanos objects in Linux kernel. IEEE Transactions on Information Forensics and Security, 2022, 18, 533- 548.
|
26 |
LATTNER C, ADVE V. LLVM: a compilation framework for lifelong program analysis&transformation[C]//Proceedings of International Symposium on Code Generation and Optimization. Washington D. C., USA: IEEE Press, 2004: 75-86.
|
27 |
|
28 |
TAN X, ZHANG Y, LU J, et al. SyzDirect: directed greybox fuzzing for Linux kernel[C]//Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security. New York, USA: ACM Press, 2023: 1630-1644.
|
29 |
LU K J, HU H. Where does it go?refining indirect-call targets with multi-layer type analysis[C]//Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. New York, USA: ACM Press, 2019: 1867-1881.
|
30 |
|
31 |
JIANG Z, ZHANG Y, XU J, et al. AEM: facilitating cross-version exploitability assessment of Linux kernel vulnerabilities[C]//Proceedings of 2023 IEEE Symposium on Security and Privacy. Washington D. C., USA: IEEE Press, 2023: 2122-2137.
|
32 |
|