Automatically generating malicious disks using symbolic execution

@article{Yang2006AutomaticallyGM,
  title={Automatically generating malicious disks using symbolic execution},
  author={Junfeng Yang and Can Sar and Paul Twohey and Cristian Cadar and Dawson R. Engler},
  journal={2006 IEEE Symposium on Security and Privacy (S&P'06)},
  year={2006},
  pages={15 pp.-257}
}
Many current systems allow data produced by potentially malicious sources to be mounted as a file system. File system code must check this data for dangerous values or invariant violations before using it. Because file system code typically runs inside the operating system kernel, even a single unchecked value can crash the machine or lead to an exploit. Unfortunately, validating file system images is complex: they form DAGs with complex dependency relationships across massive amounts of data… CONTINUE READING

Citations

Publications citing this paper.
SHOWING 1-10 OF 70 CITATIONS

EXE: Automatically Generating Inputs of Death

VIEW 5 EXCERPTS
CITES METHODS & BACKGROUND

Recon: Verifying file system consistency at runtime

VIEW 4 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

CAB-Fuzz: Practical Concolic Testing Techniques for COTS Operating Systems

  • USENIX Annual Technical Conference
  • 2017
VIEW 2 EXCERPTS
CITES METHODS & BACKGROUND

Understanding and Detecting Concurrency Attacks

  • 2017
VIEW 1 EXCERPT
CITES BACKGROUND

FILTER CITATIONS BY YEAR

2006
2019

CITATION STATISTICS

  • 2 Highly Influenced Citations

References

Publications referenced by this paper.