Towards an automatic exploit pipeline

被引:0
|
作者
Computer Science Dept., Michigan State University, East Lansing, MI 48895, United States [1 ]
机构
关键词
D O I
Abu Dhabi, United arab emirates
中图分类号
学科分类号
摘要
Pipelines
引用
收藏
相关论文
共 50 条
  • [1] Towards the automatic optimal mapping of pipeline algorithms
    González, D
    Almeida, F
    Moreno, L
    Rodríguez, C
    PARALLEL COMPUTING, 2003, 29 (02) : 241 - 254
  • [2] Automatic Exploit Generation
    Avgerinos, Thanassis
    Cha, Sang Kil
    Rebert, Alexandre
    Schwartz, Edward J.
    Woo, Maverick
    Brumley, David
    COMMUNICATIONS OF THE ACM, 2014, 57 (02) : 74 - 84
  • [3] A-R Exploit: An Automatic ROP Exploit Based On Long Sequence
    Yang, Chao
    Zheng, Tao
    Lin, Zhitian
    2014 IEEE EIGHTH INTERNATIONAL CONFERENCE ON SOFTWARE SECURITY AND RELIABILITY - COMPANION (SERE-C 2014), 2014, : 50 - 56
  • [4] Revery: From Proof-of-Concept to Exploitable (One Step towards Automatic Exploit Generation)
    Wang, Yan
    Zhang, Chao
    Xiang, Xiaobo
    Zhao, Zixuan
    Li, Wenjie
    Gong, Xiaorui
    Liu, Bingchang
    Chen, Kaixiang
    Zou, Wei
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 1914 - 1927
  • [5] Towards Naturalistic Voice Conversion: NaturalVoices Dataset with an Automatic Processing Pipeline
    Salman, Ali N.
    Du, Zongyang
    Chandra, Shreeram Suresh
    Ulgen, Ismail Rasim
    Busso, Carlos
    Sisman, Berrak
    INTERSPEECH 2024, 2024, : 4358 - 4362
  • [6] SAEG: Stateful Automatic Exploit Generation
    Wu, Yifan
    Li, Yinshuai
    Zhu, Hong
    Zhang, Yinqian
    COMPUTER SECURITY-ESORICS 2024, PT IV, 2024, 14985 : 127 - 145
  • [7] Towards an Automatic Q&A Generation for Online Courses - A Pipeline Based Approach
    Ruedian, Sylvio
    Pinkwart, Niels
    ARTIFICIAL INTELLIGENCE IN EDUCATION, AIED 2019, PT II, 2019, 11626 : 237 - 241
  • [8] Automatic Exploit Generation for Buffer Overflow Vulnerabilities
    Xu, Luhang
    Jia, Weixi
    Dong, Wei
    Li, Yongjun
    2018 IEEE 18TH INTERNATIONAL CONFERENCE ON SOFTWARE QUALITY, RELIABILITY AND SECURITY COMPANION (QRS-C), 2018, : 463 - 468
  • [9] Automatic Polymorphic Exploit Generation for Software Vulnerabilities
    Wang, Minghua
    Su, Purui
    Li, Qi
    Ying, Lingyun
    Yang, Yi
    Feng, Dengguo
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2013, 2013, 127 : 216 - +
  • [10] AUTOMATIC PIPELINE SELECTION
    DITZEN, C
    ASATO, C
    HIGH PERFORMANCE SYSTEMS-THE MAGAZINE FOR TECHNOLOGY CHAMPIONS, 1989, 10 (03): : 68 - &