Overview
Syllabus
Intro
Automatic Exploit Generation Challenge
Ghostscript v8.62 Bug
Generating Exploits
Unleashing Mayhem
How Mayhem Works: Symbolic Execution
Path Predicate = II
Safety Policy in Mayhem
Challenges
Current Resource Management in Symbolic Execution
Offline Execution
Online Execution
Mayhem: Hybrid Execution
Symbolic Indices
Another Cause: Table Lookups
Method 1: Concretization
Method 2: Fully Symbolic
Step 1 - Find Bounds
Step 2 - Index Search Tree Construction
Fully Symbolic vs. Index-based Memory Modeling Time
Index Search Tree Optimization: Piecewise Linear Approximation
Conclusion
Taught by
IEEE Symposium on Security and Privacy