Skip to main content

Showing 1–2 of 2 results for author: Heelan, S

.
  1. arXiv:1805.03450  [pdf, other

    cs.SE

    Evaluating Manual Intervention to Address the Challenges of Bug Finding with KLEE

    Authors: John Galea, Sean Heelan, Daniel Neville, Daniel Kroening

    Abstract: Symbolic execution has shown its ability to find security-relevant flaws in software, but faces significant scalability challenges. There is a commonly held belief that manual intervention by an expert can help alleviate these limiting factors. However, there has been little formal investigation of this idea. In this paper, we present our experiences applying the KLEE symbolic execution engine to… ▽ More

    Submitted 9 May, 2018; originally announced May 2018.

  2. arXiv:1804.08470  [pdf, other

    cs.CR cs.PL

    Automatic Heap Layout Manipulation for Exploitation

    Authors: Sean Heelan, Tom Melham, Daniel Kroening

    Abstract: Heap layout manipulation is integral to exploiting heap-based memory corruption vulnerabilities. In this paper we present the first automatic approach to the problem, based on pseudo-random black-box search. Our approach searches for the inputs required to place the source of a heap-based buffer overflow or underflow next to heap-allocated objects that an exploit developer, or automatic exploit ge… ▽ More

    Submitted 3 September, 2018; v1 submitted 23 April, 2018; originally announced April 2018.

    Journal ref: USENIX Security Symposium 2018: 763-779