Title
Finding the needle in the heap: combining static analysis and dynamic symbolic execution to trigger use-after-free.
Abstract
This paper presents a fully automated technique to find and trigger Use-After-Free vulnerabilities (UAF) on binary code. The approach combines a static analyzer and a dynamic symbolic execution engine. We also introduce several original heuristics for the dynamic symbolic execution part, speeding up the exploration and making this combination effective in practice. The tool we developed is open-source, and it has successfully been applied on real world vulnerabilities. As an example, we detail a proof-of-concept exploit triggering a previously unknown vulnerability on JasPer leading to the CVE-2015-5221.
Year
DOI
Venue
2016
10.1145/3015135.3015137
Proceedings of the 6th Workshop on Software Security, Protection, and Reverse Engineering
DocType
Citations 
PageRank 
Conference
2
0.37
References 
Authors
42
5
Name
Order
Citations
PageRank
Josselin Feist120.37
Laurent Mounier2118779.54
Sébastien Bardin3304.88
Robin David420.37
Marie-Laure Potet519021.34