Completed
Conclusion
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Chainsaw - Chained Automated Workflow-based Exploit Generation
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Web Applications
- 3 Web Application Example
- 4 The Problem
- 5 Challenges
- 6 Approach
- 7 Chainsaw Architecture
- 8 Seed Generation Example
- 9 Workflow Inference
- 10 Ranking Navigation Sequences
- 11 Workflow Refinement
- 12 RWFG Construction
- 13 Informed Traversal Example
- 14 Generating Working Exploits
- 15 Selected Applications
- 16 Summary of Results
- 17 Analysis Complexity
- 18 Schoolmate: Stored-XSS Exploit Example
- 19 Exploit Generation Related Work Comparison
- 20 Vulnerability Identification Comparison
- 21 Conclusion
- 22 References