Completed
Conclusion
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Unleashing Mayhem on Binary Code
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Automatic Exploit Generation Challenge
- 3 Ghostscript v8.62 Bug
- 4 Generating Exploits
- 5 Unleashing Mayhem
- 6 How Mayhem Works: Symbolic Execution
- 7 Path Predicate = II
- 8 Safety Policy in Mayhem
- 9 Challenges
- 10 Current Resource Management in Symbolic Execution
- 11 Offline Execution
- 12 Online Execution
- 13 Mayhem: Hybrid Execution
- 14 Symbolic Indices
- 15 Another Cause: Table Lookups
- 16 Method 1: Concretization
- 17 Method 2: Fully Symbolic
- 18 Step 1 - Find Bounds
- 19 Step 2 - Index Search Tree Construction
- 20 Fully Symbolic vs. Index-based Memory Modeling Time
- 21 Index Search Tree Optimization: Piecewise Linear Approximation
- 22 Conclusion