Chainsaw - Chained Automated Workflow-based Exploit Generation
Association for Computing Machinery (ACM) via YouTube
Overview
Syllabus
Intro
Web Applications
Web Application Example
The Problem
Challenges
Approach
Chainsaw Architecture
Seed Generation Example
Workflow Inference
Ranking Navigation Sequences
Workflow Refinement
RWFG Construction
Informed Traversal Example
Generating Working Exploits
Selected Applications
Summary of Results
Analysis Complexity
Schoolmate: Stored-XSS Exploit Example
Exploit Generation Related Work Comparison
Vulnerability Identification Comparison
Conclusion
References
Taught by
ACM CCS