Abstract | ||
---|---|---|
Vulnerability mining research plays an important role in the fields of network security, but without exploit, a vulnerability which can trigger program crash will be considered useless. Focus on the crash exploitable analysis, this paper summarized the reasons resulting to program crash, classified current crash exploitable identification technology into 4 mechanisms, discussed the principle, process, characteristic of each mechanism, summarized and evaluated the performance of widely used crash exploitable identification mechanisms by experiment on vulnerabilities public from CVE, NVD, and discussed the future development direction and trend of crash exploitable identification technology. It can give guidance for future development of vulnerability exploits in education application fuzzing. |
Year | DOI | Venue |
---|---|---|
2019 | 10.1109/CCOMS.2019.8821775 | 2019 IEEE 4th International Conference on Computer and Communication Systems (ICCCS) |
Keywords | DocType | ISBN |
network security,crash exploitable determination,crash analysis,vulnerability | Conference | 978-1-7281-1323-4 |
Citations | PageRank | References |
0 | 0.34 | 7 |
Authors | ||
4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Tiantian Tan | 1 | 0 | 2.03 |
Baosheng Wang | 2 | 3 | 5.81 |
Yong Tang | 3 | 27 | 4.33 |
Xu Zhou | 4 | 221 | 41.36 |