570,711 Hits in 1.5 sec

Automatic exploit generation

Thanassis Avgerinos, Sang Kil Cha, Alexandre Rebert, Edward J. Schwartz, Maverick Woo, David Brumley
2014 Communications of the ACM  
The automatic exploit generation challenge is given a program, automatically find vulnerabilities and generate exploits for them.  ...  In this paper we present AEG, the first end-to-end system for fully automatic exploit generation.  ...  Related Work Automatic Exploit Generation. Brumley et al. [4] introduced the automatic patch-based exploit generation (APEG) challenge.  ... 
doi:10.1145/2560217.2560219 fatcat:zag6jznqmfcxjnoeppcgwde2oe

Automatic Polymorphic Exploit Generation for Software Vulnerabilities [chapter]

Minghua Wang, Purui Su, Qi Li, Lingyun Ying, Yi Yang, Dengguo Feng
2013 Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering  
To address this issue, in this paper, we propose PolyAEG, a system that automatically generates multiple exploits for a vulnerable program using one corresponding abnormal input.  ...  We have successfully generated control flow hijacking exploits for 8 programs in our experiment.  ...  In conclusion, PolyAEG is capable of generating exploits automatically and polymorphically for vulnerable programs.  ... 
doi:10.1007/978-3-319-04283-1_14 fatcat:vxlkieo3ibatpon3bhqqlhlh2i

Exploiting RapidWright in the Automatic Generation of Application-Specific FPGA Overlays [article]

Joel Mandebi Mbongue, Danielle Tchuinkou Kwadjo, Christophe Bobda
2020 arXiv   pre-print
Our approach is based on the automatic extraction of hardware kernels from data flow applications. Extracted kernels are then leveraged for application-specific generation of hardware accelerators.  ...  Overlay architectures implemented on FPGA devices have been proposed as a means to increase FPGA adoption in general-purpose computing.  ...  We propose an approach for automatic generation of overlay kernels from applications.  ... 
arXiv:2001.11886v2 fatcat:whbpspobuvakti32jmsskbtewy

HAEPG: An Automatic Multi-hop Exploitation Generation Framework [chapter]

Zixuan Zhao, Yan Wang, Xiaorui Gong
2020 Lecture Notes in Computer Science  
Automatic exploit generation for heap vulnerabilities is an open challenge.  ...  In this paper, we propose HAEPG, an automatic exploit framework that can utilize known exploitation techniques to guide exploit generation.  ...  Gollum [22] is the first approach to automatic exploit generation for heap overflows in interpreters.  ... 
doi:10.1007/978-3-030-52683-2_5 fatcat:qz4u3hb63negtlsbjzvuecwiye

Exploiting News Article Structure for Automatic Corpus Generation of Entailment Datasets [article]

Jan Christian Blaise Cruz, Jose Kristian Resabal, James Lin, Dan John Velasco, Charibeth Cheng
2021 arXiv   pre-print
In this paper, we present three contributions: First, we propose a methodology for automatically producing Natural Language Inference (NLI) benchmark datasets for low-resource languages using published  ...  For future work, we recommend further studies on automatic corpus generation be done; particularly on correctness checking.  ...  NewsPH-NLI Using our proposed methodology, we automatically generate an NLI benchmark dataset in Filipino we call the NewsPH-NLI dataset.  ... 
arXiv:2010.11574v3 fatcat:t7hazysbgzbzhb2fsuwrbzoh7e

Automatic generation and exploitation of related problems in genetic programming

Krzysztof Krawiec, Bartosz Wieloch
2010 IEEE Congress on Evolutionary Computation  
We propose an evolutionary framework that uses the set of instructions provided with a genetic programming (GP) problem to automatically build a repertoire of related problems and subsequently employs  ...  General conclusion: solving in parallel the original problem and the automatically generated related problems, with exchange of some genetic material between them, typically increases the success rate.  ...  Idea The main idea is to automatically or semiautomatically generate related problems and use them to speed up the process of solving the original problem. 1.  ... 
doi:10.1109/cec.2010.5586120 dblp:conf/cec/KrawiecW10 fatcat:wghcvrrdnnc6pkidim6nfxsluq

Ontology-Based Automatic Image Annotation Exploiting Generalized Qualitative Spatial Semantics [chapter]

Christos V. Smailis, Dimitris K. Iakovidis
2012 Lecture Notes in Computer Science  
In this paper we propose a novel ontology-based methodology for automatic image annotation that exploits generalized qualitative spatial relations between objects, given an image domain.  ...  The application of the proposed methodology is demonstrated for automatic annotation of segmented objects in chest radiographs.  ...  The fixed part of the concept hierarchy in the automatically generated ontology consists of three main classes: • CoreElements is the superset of all the other classes in the automatically generated ontology  ... 
doi:10.1007/978-3-642-30448-4_38 fatcat:3n7etllmobganmoj6gsxx7z3l4

Automatic generation of inter-component communication exploits for Android applications

Joshua Garcia, Mahmoud Hammad, Negar Ghorbani, Sam Malek
2017 Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering - ESEC/FSE 2017  
In this paper, we provide the rst approach for automatically generating exploits for Android apps, called Le erBomb, relying on a combined path-sensitive symbolic execution-based static analysis, and the  ...  Exploitability can aid in reducing false positives of vulnerability analysis, and can help engineers triage bugs.  ...  To enable automatic exploit generation (AEG) for Android apps, two challenges must be overcome.  ... 
doi:10.1145/3106237.3106286 dblp:conf/sigsoft/GarciaHGM17 fatcat:vsonb74y3ng2nhflua7ltcchwm

Software Crash Analysis for Automatic Exploit Generation on Binary Programs

Shih-Kun Huang, Min-Hsiang Huang, Po-Yen Huang, Han-Lin Lu, Chung-Wei Lai
2014 IEEE Transactions on Reliability  
This paper presents a new method, capable of automatically generating attacks on binary programs from software crashes.  ...  Using this method to generate exploits is an automated process for software failures without source code.  ...  Furthermore, if the tainted continuation is symbolic, an exploit can be automatically generated.  ... 
doi:10.1109/tr.2014.2299198 fatcat:xf4ljdnf6bgfjikpw7dokmj3a4

Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications

David Brumley, Pongsin Poosankam, Dawn Song, Jiang Zheng
2008 IEEE Symposium on Security and Privacy : Proceedings  
The automatic patch-based exploit generation problem is: given a program P and a patched version of the program P ′ , automatically generate an exploit for the potentially unknown vulnerability present  ...  In this paper, we propose techniques for automatic patch-based exploit generation, and show that our techniques can automatically generate exploits for 5 Microsoft programs based upon patches provided  ...  Automatic Patch-Based Exploit Generation In this section, we describe our approach and steps for automatic patch-based exploit generation.  ... 
doi:10.1109/sp.2008.17 dblp:conf/sp/BrumleyPSZ08 fatcat:jm3numdocjdv5p52hvcj623ot4

SemPCA-Summarizer: Exploiting Semantic Principal Component Analysis for Automatic Summary Generation

Óscar Alcón, Elena Lloret
2018 Computing and informatics  
The results obtained show that the generated summaries are very competitive, both from a quantitative and a qualitative viewpoint, thus indicating that our proposed approach is appropriate for briefly  ...  Quantitative evaluation conducts an automatic evaluation comparing the generated automatic summaries with respect to manual summaries, which are taken into account as model summaries.  ...  Qualitative evaluation completes the automatic evaluation, by means of a manual evaluation, which gathers and analyzes the users' opinion about the different generated summaries.  ... 
doi:10.4149/cai_2018_5_1126 fatcat:zql6zwiy6jffriyztzdhlhffs4

Exploiting user clicks for automatic seed set generation for entity matching

Xiao Bai, Flavio P. Junqueira, Srinivasan H. Sengamedu
2013 Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining - KDD '13  
In this paper, we present an approach that leverages user clicks during Web search to automatically generate training data for entity matching.  ...  We use random walk with restart to reduce data sparseness, rely on co-clustering to group queries and Web pages, and exploit page similarity to improve matching precision.  ...  We show that large automatically generated seed data results in better classifier than small editorially generated seed data, revealing the potential of our approach on generating large-scale seed data  ... 
doi:10.1145/2487575.2487662 dblp:conf/kdd/BaiJS13 fatcat:xttabuoxubhs5cym5hl2nawoci

Intelligent Health Diagnosis Technique Exploiting Automatic Ontology Generation and Web-Based Personal Health Record Services

Gun-Woo Kim, Dong-Ho Lee
2019 IEEE Access  
In this paper, we propose an intelligent health diagnosis technique that exploits automatically generated ontology and Web-based personal health record services.  ...  The proposed technique first automatically generates a human disease diagnosis ontology by exploiting two well-established ontologies for diseases and symptoms: a large-scale medical bibliographic database  ...  AUTOMATIC ONTOLOGY GENERATION COMPONENT This component is used to automatically generate the HDDO.  ... 
doi:10.1109/access.2019.2891710 fatcat:vqx7m4qekraojhgioby7ia77ay

Automatic Generation of Tests to Exploit XML Injection Vulnerabilities in Web Applications

Sadeeq Jan, Annibale Panichella, Andrea Arcuri, Lionel Briand
2017 IEEE Transactions on Software Engineering  
Previous work has shown that it is possible to automatically generate such kind of attacks using search-based techniques.  ...  A large empirical study, involving also two industrial systems, shows that our technique is effective at automatically generating XML injection attacks.  ...  The first three elements are formed using the submitted user inputs while the RequestID element is generated by the application automatically.  ... 
doi:10.1109/tse.2017.2778711 fatcat:l5tbdpn6ufgvzinjmrse5qhvqm

Automatically exploiting cross-invocation parallelism using runtime information

Jialu Huang, T. B. Jablin, S. R. Beard, N. P. Johnson, D. I. August
2013 Proceedings of the 2013 IEEE/ACM International Symposium on Code Generation and Optimization (CGO)  
By contrast, this paper proposes DOMORE, the first automatic parallelization technique that uses runtime information to exploit additional cross-invocation parallelism.  ...  Some automatic techniques address this problem by exploiting crossinvocation parallelism. These techniques use static analysis to partition iterations among threads to avoid crossthread dependences.  ...  A few automatic parallelization techniques exploit crossinvocation parallelism [9, 25, 35, 37] .  ... 
doi:10.1109/cgo.2013.6495001 dblp:conf/cgo/HuangJBJA13 fatcat:ctuqrto5knfppjaascyhexq36u
« Previous Showing results 1 — 15 out of 570,711 results