Unleashing Mayhem on Binary Code

Unleashing Mayhem on Binary Code

IEEE Symposium on Security and Privacy via YouTube Direct link

Unleashing Mayhem

5 of 22

5 of 22

Unleashing Mayhem

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Unleashing Mayhem on Binary Code

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Automatic Exploit Generation Challenge
  3. 3 Ghostscript v8.62 Bug
  4. 4 Generating Exploits
  5. 5 Unleashing Mayhem
  6. 6 How Mayhem Works: Symbolic Execution
  7. 7 Path Predicate = II
  8. 8 Safety Policy in Mayhem
  9. 9 Challenges
  10. 10 Current Resource Management in Symbolic Execution
  11. 11 Offline Execution
  12. 12 Online Execution
  13. 13 Mayhem: Hybrid Execution
  14. 14 Symbolic Indices
  15. 15 Another Cause: Table Lookups
  16. 16 Method 1: Concretization
  17. 17 Method 2: Fully Symbolic
  18. 18 Step 1 - Find Bounds
  19. 19 Step 2 - Index Search Tree Construction
  20. 20 Fully Symbolic vs. Index-based Memory Modeling Time
  21. 21 Index Search Tree Optimization: Piecewise Linear Approximation
  22. 22 Conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.