整理所学习的Paper
- 《Revery: From Proof-of-Concept to Exploitable》
- 《Automatic Generation of Control Flow Hijacking Exploits for Software Vulnerabilities》
- 《Data-Oriented programming: On the expresivenes of non-control data attacks》
- 《Automatic Generation of Data-Oriented Exploits》
- 《Automatic Heap Layout Manipulation for Exploitation》
- 《SMT Solvers for Software Security》
- 《The Mayhem CRS》
- 《Transformation-aware Exploit Generation using a HI-CFG》
- 《Shining Light onShadow Stacks》新影子栈设计
- (PPT)《The Automated Exploitation Grand Challenge》
- (PPT)《An Introduction to Dynamic Symbolic Execution and the KLEE Infrastructure》
- (PPT)《An Introduction To Binary Exploitation》
- (PPT)《The Automated Exploitation Grand Challenge A Five-Year Retrospective》
- (PPT)《automatic binary exploitation and patching using mechanical shellphish.pdf》
- (PPT)《symbolic execution》
- 《(State of) The Art of War: Offensive Techniques in Binary Analysis》
- 《AEG: Automatic Exploit Generation》
- 《CRAX: Software Crash Analysis for Automatic Exploit Generation by Modeling Attacks as Symbolic Continuations》
- 《Automatic Polymorphic Exploit Generation for Software Vulnerabilities》
- 《Unleashing MAYHEM on Binary Code》
- 《Q: Exploit Hardening Made Easy》
- 《Survey of Automated Vulnerability Detection and Exploit Generation Techniques in Cyber Reasoning Systems》
- 《软件与网络安全研究综述》
- 《CBTracer: Continuously Building Datasets for Binary Vulnerability and Exploit Research》