We found a match
Your institution may have access to this item. Find your institution then sign in to continue.
- Title
Identifying exploitable memory objects for out‐of‐bound write vulnerabilities.
- Authors
Li, Runhao; Zhang, Bin; Tang, Chaojing
- Abstract
Exploiting an out‐of‐bounds write vulnerability in general‐purpose applications has become a current research focus. Given the large scale of code in programs, selecting appropriate memory objects for exploitation is challenging. This letter proposes a corrupted data propagation‐guided fuzzing method. By tracking the propagation process of corrupted data among memory objects, a multi‐level fuzzing schedule is proposed to search the execution paths. Experimental results show that this proposed method, EMOFuzz, can effectively identify exploitable objects under various overflow lengths, significantly enhancing the efficiency of exploitability analysis.
- Subjects
COMPUTER network security; MEMORY; OBJECT tracking (Computer vision)
- Publication
Electronics Letters (Wiley-Blackwell), 2024, Vol 60, Issue 5, p1
- ISSN
0013-5194
- Publication type
Article
- DOI
10.1049/ell2.13136