Towards an automatic exploit pipeline

被引:0
|
作者
Computer Science Dept., Michigan State University, East Lansing, MI 48895, United States [1 ]
机构
关键词
D O I
Abu Dhabi, United arab emirates
中图分类号
学科分类号
摘要
Pipelines
引用
收藏
相关论文
共 50 条
  • [11] Towards Automatic Measure-Wise Feature Extraction Pipeline for Music Performance Analysis
    Istvanek, Matej
    Miklanek, Stepan
    2022 45TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING, TSP, 2022, : 192 - 195
  • [12] Towards Automated Exploit Generation for Embedded Systems
    Ruffell, Matthew
    Hong, Jin B.
    Kim, Hyoungshick
    Kim, Dong Seong
    INFORMATION SECURITY APPLICATIONS, WISA 2016, 2017, 10144 : 161 - 173
  • [13] An Automatic Exploit Generation Method Based on Symbolic Execution
    Fang Hao
    Fen-Wenbo
    Fu-Menglin
    2018 EIGHTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2018), 2018, : 437 - 440
  • [14] Automatic validation of pipeline specifications
    Mishra, P
    Dutt, N
    Nicolau, A
    SIXTH IEEE INTERNATIONAL HIGH-LEVEL DESIGN VALIDATION AND TEST WORKSHOP, PROCEEDINGS, 2001, : 9 - 13
  • [15] PatchSweetner: Exploit Detection Through the Automatic Transformation of Security Patches
    Larmuseau, Adriaan
    Shila, Devu
    2018 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2018), 2018, : 951 - 957
  • [16] FUGIO: Automatic Exploit Generation for PHP Object Injection Vulnerabilities
    Park, Sunnyeo
    Kim, Daejun
    Jana, Suman
    Son, Sooel
    PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, 2022, : 197 - 214
  • [17] Software Crash Analysis for Automatic Exploit Generation on Binary Programs
    Huang, Shih-Kun
    Huang, Min-Hsiang
    Huang, Po-Yen
    Lu, Han-Lin
    Lai, Chung-Wei
    IEEE TRANSACTIONS ON RELIABILITY, 2014, 63 (01) : 270 - 289
  • [18] Your Exploit is Mine: Automatic Shellcode Transplant for Remote Exploits
    Bao, Tiffany
    Wang, Ruoyu
    Shoshitaishvili, Yan
    Brumley, David
    2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2017, : 824 - 839
  • [19] Automatic analysis of loops to exploit operator parallelism on reconfigurable systems
    Ramasubramanian, N
    Subramanian, R
    Pande, S
    LANGUAGES AND COMPILERS FOR PARALLEL COMPUTING, 1999, 1656 : 305 - 322
  • [20] AUTOMATIC PIPELINE CONTROL ADVANCES IN JAPAN
    TAKATSU, R
    SUGAYA, S
    OIL & GAS JOURNAL, 1977, 75 (03) : 54 - &