Back to Results
First PageMeta Content
Software quality / Cyberwarfare / Vulnerability / Buffer overflow / Fuzz testing / Stack / Heap overflow / Exploit / Memory safety / Software bugs / Software testing / Computer security


Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications David Brumley, Pongsin Poosankam Dawn Song Jiang Zheng {dbrumley,ppoosank}@cs.cmu.edu [removed] [removed]
Add to Reading List

Document Date: 2014-05-29 15:38:01


Open Document

File Size: 214,89 KB

Share Result on Facebook

City

Automatic Patch / The automatic patch / /

Company

eEyE / Combined Static / Dynamic Analysis / Microsoft / ASP.NET / /

/

Event

Product Recall / Product Issues / /

Facility

Korean Institute / /

IndustryTerm

hacked web sites / date site / multi-cast groups / Internet Group Management Protocol / Internet Explorer / /

OperatingSystem

Microsoft Windows / /

Organization

U.S. Army Research Office / National Science Foundation / Korean Ministry of Information and Communication / U.S. Government / Carnegie Mellon / Carnegie Mellon University UC Berkeley / Korean Institute for Information Technology Advancement / /

Person

Exploit / David Brumley / Dawn Song Jiang Zheng / /

Position

tackle / straight-forward / manually reverse engineer / Candidate / /

Product

Formula Generation / Sennheiser IE 6 Headphone/Headset / Binary Diffing Suite / /

ProgrammingLanguage

ASP.NET / JScript / C++ / /

Technology

alpha / Information Technology / /

SocialTag