Gollum: modular and greybox exploit generation for heap overflows in interpreters
- Submitting institution
-
University of Oxford
- Unit of assessment
- 11 - Computer Science and Informatics
- Output identifier
- 10417
- Type
- E - Conference contribution
- DOI
-
10.1145/3319535.3354224
- Title of conference / published proceedings
- Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security
- First page
- 1689
- Volume
- -
- Issue
- -
- ISSN
- 1543-7221
- Open access status
- Compliant
- Month of publication
- November
- Year of publication
- 2019
- URL
-
-
- Supplementary information
-
-
- Request cross-referral to
- -
- Output has been delayed by COVID-19
- No
- COVID-19 affected output statement
- -
- Forensic science
- No
- Criminology
- No
- Interdisciplinary
- No
- Number of additional authors
-
2
- Research group(s)
-
-
- Citation count
- 1
- Proposed double-weighted
- No
- Reserve for an output with double weighting
- No
- Additional information
- This paper presents the first practical approach to automatic exploit generation for heap overflows in interpreters. It is also the first approach to exploit generation, for any class of target program, that integrates a solution for automatic heap layout manipulation. This work integrates three significant research innovations: a new, purely greybox approach, a concept of lazy resolution of tasks during exploit generation, and a new genetic algorithm for solving heap layout problems. The research is validated by experiments that produce exploits from 10 unique vulnerabilities in the PHP and Python interpreters, 5 of which did not have existing public exploits.
- Author contribution statement
- -
- Non-English
- No
- English abstract
- -