├── .gitignore ├── README.md ├── _config.yml ├── image ├── blog_24px.jpg ├── github_24px.png ├── pdf_24px.png ├── ppt_24px.png ├── wechat_24px.png └── zhihu.png └── paper ├── 2005Automating Mimicry Attacks Using Static Binary Analysis.pdf ├── 2008Automatic Generation of XSS and SQL Injection Attacks with Goal-directed Model Checking.pdf ├── 2008Automatic Patch-Based Exploit Generation is Possible Techniques and Implications.pdf ├── 2009Automatic Generation of Control Flow Hijacking Exploits for Software Vulnerabilities.pdf ├── 2009Automatic creation of SQL Injection and cross-site scripting attacks.pdf ├── 2009Return-Oriented Rootkits- Bypassing Kernel Code Integrity Protection Mechanisms.pdf ├── 2010Crash analysis with BitBlaze.pdf ├── 2011AEG Automatic Exploit Generation.pdf ├── 2011Automatic construction of jump-oriented programming shellcode (on the x86).pdf ├── 2011Q Exploit Hardening Made Easy.pdf ├── 2011WAPTEC- Whitebox analysis of Web applications for parameter tampering exploit construction.pdf ├── 2012CRAX Software Crash Analysis for Automatic Exploit Generation by Modeling Attacks as Symbolic Conti.pdf ├── 2012Unleashing Mayhem on Binary Code.pdf ├── 2013Automatic Polymorphic Exploit Generation for Software Vulnerabilities.pdf ├── 2013CRAXweb Automatic Web Application Testing and Attack Generation.pdf ├── 2013Transformation-aware Exploit Generation using a HI-CFG.pdf ├── 2014Automatic_Exploit_Generation.pdf ├── 2014Exploit Generation from Software Failures.pdf ├── 2014Program Crash Analysis based on Taint analysis.pdf ├── 2014ROP is Still Dangerous- Breaking Modern Defenses.pdf ├── 2014Software Crash Analysis for Automatic Exploit Generation on Binary Programs.pdf ├── 2015Automated Exploit Generation for Stack Buffer Overflow Vulnerabilities.pdf ├── 2015Automatic Generation of Data-Oriented Exploits.pdf ├── 2015Exploit Generation for Information Flow Leaks in.pdf ├── 2015From Collision To Exploitation Unleashing Use-After-Free Vulnerabilities in Linux Kernel.pdf ├── 2015Practical Exploit Generation for Intent Message Vulnerabilities in Android.pdf ├── 2015Static Detection and Automatic Exploitation of Intent Message Vulnerabilities in Android Applications.pdf ├── 2015基于模拟攻击的内核提权漏洞自动利用系统_李晓琦.pdf ├── 2016Chainsaw- Chained Automated Workflow-based Exploit Generation.pdf ├── 2016Data-Oriented Programming- On the Expressiveness of Non-control Data Attacks.pdf ├── 2016Deduplication and Exploitability Determination of UAF Vulnerability Samples by Fast Clustering.pdf ├── 2016SOK (State of) The Art of War Offensive Techniques in Binary Analysis.pdf ├── 2016Towards Automated Exploit Generation for Embedded Systems.pdf ├── 2016基于指针时空分析的软件异常可利用性判定_彭建山.pdf ├── 2016软件漏洞自动利用研究进展.pdf ├── 2017Automatic Generation of Inter-Component Communication.pdf ├── 2017Automatic Generation of Tests to Exploit XML Injection Vulnerabilities in Web Applications.pdf ├── 2017Automatically Assessing Crashes from Heap Overflows.pdf ├── 2017Construct exploit constraint in crash analysis by bypassing canary.pdf ├── 2017Modular synthesis of heap exploits.pdf ├── 2017System Service Call-oriented Symbolic Execution of Android Framework with Applications to Vulnerability Discovery and Exploit Generation.pdf ├── 2017Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targete.pdf ├── 2017Your Exploit is Mine Automatic Shellcode Transplant for Remote Exploits.pdf ├── 2017基于符号执行的自动利用生成系统.pdf ├── 2018Automatic Heap Layout Manipulation for Exploitation.pdf ├── 2018Block oriented programming automating data-only attacks.pdf ├── 2018Crash可利用性分析方法研究综述.pdf ├── 2018End-to-End Automated Exploit Generation for Validating the Security of Processor Designs.pdf ├── 2018FUZE Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities.pdf ├── 2018HEAPHOPPER Bringing Bounded Model Checking to Heap Implementation Security.pdf ├── 2018NAVEX--Precise and Scalable Exploit Generation for Dynamic Web Applications.pdf ├── 2018Pangr- A Behavior-Based Automatic Vulnerability Detection and Exploitation Framework.pdf ├── 2018Revery From Proof-of-Concept to Exploitable.pdf ├── 2018Survey of Automated Vulnerability Detection and Exploit Generation Techniques in Cyber Reasoning Systems.pdf ├── 2018The Coming Era of AlphaHacking-- A Survey of Automatic Software Vulnerability Detection, Exploitation and Patching Techniques.pdf ├── 2018Towards Automated Generation of Exploitation Primitives for Web Browsers.pdf ├── 2018automatic exploit generation for buffer overflow vulnerability.pdf ├── 2018teEther- Gnawing at Ethereum to Automatically Exploit Smart Contracts.pdf ├── 2018从自动化到智能化-软件漏洞挖掘技术进展.pdf ├── 2019ARG Automatic ROP chains Generation.pdf ├── 2019Analysis to Heap Overflow Exploit in Linux with Symbolic.pdf ├── 2019Automatic Generation of Capability Leaks' Exploits for Android Applications.pdf ├── 2019From proof-of-concept to exploitable (One step towards automatic exploitability assessment).pdf ├── 2019Gollum Automatic Exploit Generation(AEG) for Heap Overflows in Interpreters.pdf ├── 2019KEPLER Facilitating Control-flow Hijacking Primitive Evaluation for Linux Kernel Vulnerabilities.pdf ├── 2019SLAKE Facilitating Slab Manipulation for Exploiting Vulnerabilities in the Linux Kernel.pdf ├── 2019基于符号执行的Return_to_dl_resolve利用代码自动生成方法_方皓.pdf ├── 2019基于符号执行的缓冲区溢出漏洞自动化利用.pdf ├── 2019安全漏洞自动利用综述_赵尚儒.pdf ├── 2019有限资源条件下的软件漏洞自动挖掘与利用.pdf ├── 2019自动化漏洞利用研究进展_靳宪龙.pdf ├── 2019软件漏洞自动利用研究综述.pdf ├── 2020A Generic Technique for Automatically Finding Defense-Aware Code Reuse Attacks.pdf ├── 2020A Pattern-Based Software Testing Framework for Exploitability Evaluation of Metadata Corruption Vulnerabilities.pdf ├── 2020A Systematic Study of Elastic Objects in Kernel Exploitation.pdf ├── 2020AURORA Statistical Crash Analysis for Automated Root Cause Explanation.pdf ├── 2020Attacks on Lightweight Hardware-Based Security Primitives.pdf ├── 2020Automatic Generation of Compact Printable Shellcodes for x86.pdf ├── 2020Automatic Techniques to Systematically Discover New Heap Exploitation Primitives.pdf ├── 2020Autosploit A Fully Automated Framework for Evaluating.pdf ├── 2020EthPloit From Fuzzing to Efficient Exploit Generation against Smart Contracts.pdf ├── 2020Guide Me to Exploit Assisted ROP Exploit Generation for ActionScript Virtual Machine.pdf ├── 2020HAEPG An Automatic Multi-hop Exploitation Generation Framework.pdf ├── 2020HS-Pilot Heap Security Evaluation Tool Model Based on Atomic Heap Interaction.pdf ├── 2020KOOBE Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities.pdf ├── 2020Relating the Empirical Foundations of Attack Generation and Vulnerability Discovery.pdf ├── 2020Survey of Methods for Automated Code-Reuse Exploit Generation.pdf ├── 2020Tainting-Assisted and Context-Migrated Symbolic Execution of Android Framework for Vulnerability Discovery and Exploit Generation.pdf ├── 2020基于Crash的漏洞利用自动生成系统.pdf ├── 2020浅谈自动化漏洞利用的发展_刘凯.pdf ├── 2021A Framework for Automatic Exploit Generation for JIT Compilers.pdf ├── 2021AngErza Automated Exploit Generation.pdf ├── 2021Demons in the Shared Kernel Abstract Resource Attacks Against OS-level Virtualization.pdf ├── 2021EXPRACE Exploiting Kernel Races through Raising Interrupts.pdf ├── 2021End-to-End Automated Exploit Generation for Processor Security Validation.pdf ├── 2021GUI-Squatting Attack Automated Generation of Android Phishing Apps.pdf ├── 2021MAZE Towards Automated Heap Feng Shui.pdf ├── 2021Shellcode_IA32 A Dataset for Automatic Shellcode Generation.pdf ├── 2021Talking About My Generation Targeted DOM-based XSS Exploit.pdf ├── 2021Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains.pdf └── 2022FUGIO Automatic Exploit Generation for PHP Object Injection Vulnerabilities.pdf /.gitignore: -------------------------------------------------------------------------------- 1 | .DS_Store 2 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/README.md -------------------------------------------------------------------------------- /_config.yml: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/_config.yml -------------------------------------------------------------------------------- /image/blog_24px.jpg: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/image/blog_24px.jpg -------------------------------------------------------------------------------- /image/github_24px.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/image/github_24px.png -------------------------------------------------------------------------------- /image/pdf_24px.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/image/pdf_24px.png -------------------------------------------------------------------------------- /image/ppt_24px.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/image/ppt_24px.png -------------------------------------------------------------------------------- /image/wechat_24px.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/image/wechat_24px.png -------------------------------------------------------------------------------- /image/zhihu.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/image/zhihu.png -------------------------------------------------------------------------------- /paper/2005Automating Mimicry Attacks Using Static Binary Analysis.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2005Automating Mimicry Attacks Using Static Binary Analysis.pdf -------------------------------------------------------------------------------- /paper/2008Automatic Generation of XSS and SQL Injection Attacks with Goal-directed Model Checking.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2008Automatic Generation of XSS and SQL Injection Attacks with Goal-directed Model Checking.pdf -------------------------------------------------------------------------------- /paper/2008Automatic Patch-Based Exploit Generation is Possible Techniques and Implications.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2008Automatic Patch-Based Exploit Generation is Possible Techniques and Implications.pdf -------------------------------------------------------------------------------- /paper/2009Automatic Generation of Control Flow Hijacking Exploits for Software Vulnerabilities.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2009Automatic Generation of Control Flow Hijacking Exploits for Software Vulnerabilities.pdf -------------------------------------------------------------------------------- /paper/2009Automatic creation of SQL Injection and cross-site scripting attacks.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2009Automatic creation of SQL Injection and cross-site scripting attacks.pdf -------------------------------------------------------------------------------- /paper/2009Return-Oriented Rootkits- Bypassing Kernel Code Integrity Protection Mechanisms.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2009Return-Oriented Rootkits- Bypassing Kernel Code Integrity Protection Mechanisms.pdf -------------------------------------------------------------------------------- /paper/2010Crash analysis with BitBlaze.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2010Crash analysis with BitBlaze.pdf -------------------------------------------------------------------------------- /paper/2011AEG Automatic Exploit Generation.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2011AEG Automatic Exploit Generation.pdf -------------------------------------------------------------------------------- /paper/2011Automatic construction of jump-oriented programming shellcode (on the x86).pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2011Automatic construction of jump-oriented programming shellcode (on the x86).pdf -------------------------------------------------------------------------------- /paper/2011Q Exploit Hardening Made Easy.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2011Q Exploit Hardening Made Easy.pdf -------------------------------------------------------------------------------- /paper/2011WAPTEC- Whitebox analysis of Web applications for parameter tampering exploit construction.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2011WAPTEC- Whitebox analysis of Web applications for parameter tampering exploit construction.pdf -------------------------------------------------------------------------------- /paper/2012CRAX Software Crash Analysis for Automatic Exploit Generation by Modeling Attacks as Symbolic Conti.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2012CRAX Software Crash Analysis for Automatic Exploit Generation by Modeling Attacks as Symbolic Conti.pdf -------------------------------------------------------------------------------- /paper/2012Unleashing Mayhem on Binary Code.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2012Unleashing Mayhem on Binary Code.pdf -------------------------------------------------------------------------------- /paper/2013Automatic Polymorphic Exploit Generation for Software Vulnerabilities.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2013Automatic Polymorphic Exploit Generation for Software Vulnerabilities.pdf -------------------------------------------------------------------------------- /paper/2013CRAXweb Automatic Web Application Testing and Attack Generation.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2013CRAXweb Automatic Web Application Testing and Attack Generation.pdf -------------------------------------------------------------------------------- /paper/2013Transformation-aware Exploit Generation using a HI-CFG.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2013Transformation-aware Exploit Generation using a HI-CFG.pdf -------------------------------------------------------------------------------- /paper/2014Automatic_Exploit_Generation.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2014Automatic_Exploit_Generation.pdf -------------------------------------------------------------------------------- /paper/2014Exploit Generation from Software Failures.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2014Exploit Generation from Software Failures.pdf -------------------------------------------------------------------------------- /paper/2014Program Crash Analysis based on Taint analysis.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2014Program Crash Analysis based on Taint analysis.pdf -------------------------------------------------------------------------------- /paper/2014ROP is Still Dangerous- Breaking Modern Defenses.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2014ROP is Still Dangerous- Breaking Modern Defenses.pdf -------------------------------------------------------------------------------- /paper/2014Software Crash Analysis for Automatic Exploit Generation on Binary Programs.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2014Software Crash Analysis for Automatic Exploit Generation on Binary Programs.pdf -------------------------------------------------------------------------------- /paper/2015Automated Exploit Generation for Stack Buffer Overflow Vulnerabilities.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2015Automated Exploit Generation for Stack Buffer Overflow Vulnerabilities.pdf -------------------------------------------------------------------------------- /paper/2015Automatic Generation of Data-Oriented Exploits.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2015Automatic Generation of Data-Oriented Exploits.pdf -------------------------------------------------------------------------------- /paper/2015Exploit Generation for Information Flow Leaks in.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2015Exploit Generation for Information Flow Leaks in.pdf -------------------------------------------------------------------------------- /paper/2015From Collision To Exploitation Unleashing Use-After-Free Vulnerabilities in Linux Kernel.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2015From Collision To Exploitation Unleashing Use-After-Free Vulnerabilities in Linux Kernel.pdf -------------------------------------------------------------------------------- /paper/2015Practical Exploit Generation for Intent Message Vulnerabilities in Android.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2015Practical Exploit Generation for Intent Message Vulnerabilities in Android.pdf -------------------------------------------------------------------------------- /paper/2015Static Detection and Automatic Exploitation of Intent Message Vulnerabilities in Android Applications.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2015Static Detection and Automatic Exploitation of Intent Message Vulnerabilities in Android Applications.pdf -------------------------------------------------------------------------------- /paper/2015基于模拟攻击的内核提权漏洞自动利用系统_李晓琦.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2015基于模拟攻击的内核提权漏洞自动利用系统_李晓琦.pdf -------------------------------------------------------------------------------- /paper/2016Chainsaw- Chained Automated Workflow-based Exploit Generation.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2016Chainsaw- Chained Automated Workflow-based Exploit Generation.pdf -------------------------------------------------------------------------------- /paper/2016Data-Oriented Programming- On the Expressiveness of Non-control Data Attacks.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2016Data-Oriented Programming- On the Expressiveness of Non-control Data Attacks.pdf -------------------------------------------------------------------------------- /paper/2016Deduplication and Exploitability Determination of UAF Vulnerability Samples by Fast Clustering.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2016Deduplication and Exploitability Determination of UAF Vulnerability Samples by Fast Clustering.pdf -------------------------------------------------------------------------------- /paper/2016SOK (State of) The Art of War Offensive Techniques in Binary Analysis.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2016SOK (State of) The Art of War Offensive Techniques in Binary Analysis.pdf -------------------------------------------------------------------------------- /paper/2016Towards Automated Exploit Generation for Embedded Systems.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2016Towards Automated Exploit Generation for Embedded Systems.pdf -------------------------------------------------------------------------------- /paper/2016基于指针时空分析的软件异常可利用性判定_彭建山.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2016基于指针时空分析的软件异常可利用性判定_彭建山.pdf -------------------------------------------------------------------------------- /paper/2016软件漏洞自动利用研究进展.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2016软件漏洞自动利用研究进展.pdf -------------------------------------------------------------------------------- /paper/2017Automatic Generation of Inter-Component Communication.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2017Automatic Generation of Inter-Component Communication.pdf -------------------------------------------------------------------------------- /paper/2017Automatic Generation of Tests to Exploit XML Injection Vulnerabilities in Web Applications.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2017Automatic Generation of Tests to Exploit XML Injection Vulnerabilities in Web Applications.pdf -------------------------------------------------------------------------------- /paper/2017Automatically Assessing Crashes from Heap Overflows.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2017Automatically Assessing Crashes from Heap Overflows.pdf -------------------------------------------------------------------------------- /paper/2017Construct exploit constraint in crash analysis by bypassing canary.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2017Construct exploit constraint in crash analysis by bypassing canary.pdf -------------------------------------------------------------------------------- /paper/2017Modular synthesis of heap exploits.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2017Modular synthesis of heap exploits.pdf -------------------------------------------------------------------------------- /paper/2017System Service Call-oriented Symbolic Execution of Android Framework with Applications to Vulnerability Discovery and Exploit Generation.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2017System Service Call-oriented Symbolic Execution of Android Framework with Applications to Vulnerability Discovery and Exploit Generation.pdf -------------------------------------------------------------------------------- /paper/2017Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targete.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2017Unleashing Use-Before-Initialization Vulnerabilities in the Linux Kernel Using Targete.pdf -------------------------------------------------------------------------------- /paper/2017Your Exploit is Mine Automatic Shellcode Transplant for Remote Exploits.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2017Your Exploit is Mine Automatic Shellcode Transplant for Remote Exploits.pdf -------------------------------------------------------------------------------- /paper/2017基于符号执行的自动利用生成系统.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2017基于符号执行的自动利用生成系统.pdf -------------------------------------------------------------------------------- /paper/2018Automatic Heap Layout Manipulation for Exploitation.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2018Automatic Heap Layout Manipulation for Exploitation.pdf -------------------------------------------------------------------------------- /paper/2018Block oriented programming automating data-only attacks.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2018Block oriented programming automating data-only attacks.pdf -------------------------------------------------------------------------------- /paper/2018Crash可利用性分析方法研究综述.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2018Crash可利用性分析方法研究综述.pdf -------------------------------------------------------------------------------- /paper/2018End-to-End Automated Exploit Generation for Validating the Security of Processor Designs.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2018End-to-End Automated Exploit Generation for Validating the Security of Processor Designs.pdf -------------------------------------------------------------------------------- /paper/2018FUZE Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2018FUZE Towards Facilitating Exploit Generation for Kernel Use-After-Free Vulnerabilities.pdf -------------------------------------------------------------------------------- /paper/2018HEAPHOPPER Bringing Bounded Model Checking to Heap Implementation Security.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2018HEAPHOPPER Bringing Bounded Model Checking to Heap Implementation Security.pdf -------------------------------------------------------------------------------- /paper/2018NAVEX--Precise and Scalable Exploit Generation for Dynamic Web Applications.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2018NAVEX--Precise and Scalable Exploit Generation for Dynamic Web Applications.pdf -------------------------------------------------------------------------------- /paper/2018Pangr- A Behavior-Based Automatic Vulnerability Detection and Exploitation Framework.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2018Pangr- A Behavior-Based Automatic Vulnerability Detection and Exploitation Framework.pdf -------------------------------------------------------------------------------- /paper/2018Revery From Proof-of-Concept to Exploitable.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2018Revery From Proof-of-Concept to Exploitable.pdf -------------------------------------------------------------------------------- /paper/2018Survey of Automated Vulnerability Detection and Exploit Generation Techniques in Cyber Reasoning Systems.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2018Survey of Automated Vulnerability Detection and Exploit Generation Techniques in Cyber Reasoning Systems.pdf -------------------------------------------------------------------------------- /paper/2018The Coming Era of AlphaHacking-- A Survey of Automatic Software Vulnerability Detection, Exploitation and Patching Techniques.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2018The Coming Era of AlphaHacking-- A Survey of Automatic Software Vulnerability Detection, Exploitation and Patching Techniques.pdf -------------------------------------------------------------------------------- /paper/2018Towards Automated Generation of Exploitation Primitives for Web Browsers.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2018Towards Automated Generation of Exploitation Primitives for Web Browsers.pdf -------------------------------------------------------------------------------- /paper/2018automatic exploit generation for buffer overflow vulnerability.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2018automatic exploit generation for buffer overflow vulnerability.pdf -------------------------------------------------------------------------------- /paper/2018teEther- Gnawing at Ethereum to Automatically Exploit Smart Contracts.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2018teEther- Gnawing at Ethereum to Automatically Exploit Smart Contracts.pdf -------------------------------------------------------------------------------- /paper/2018从自动化到智能化-软件漏洞挖掘技术进展.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2018从自动化到智能化-软件漏洞挖掘技术进展.pdf -------------------------------------------------------------------------------- /paper/2019ARG Automatic ROP chains Generation.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2019ARG Automatic ROP chains Generation.pdf -------------------------------------------------------------------------------- /paper/2019Analysis to Heap Overflow Exploit in Linux with Symbolic.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2019Analysis to Heap Overflow Exploit in Linux with Symbolic.pdf -------------------------------------------------------------------------------- /paper/2019Automatic Generation of Capability Leaks' Exploits for Android Applications.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2019Automatic Generation of Capability Leaks' Exploits for Android Applications.pdf -------------------------------------------------------------------------------- /paper/2019From proof-of-concept to exploitable (One step towards automatic exploitability assessment).pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2019From proof-of-concept to exploitable (One step towards automatic exploitability assessment).pdf -------------------------------------------------------------------------------- /paper/2019Gollum Automatic Exploit Generation(AEG) for Heap Overflows in Interpreters.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2019Gollum Automatic Exploit Generation(AEG) for Heap Overflows in Interpreters.pdf -------------------------------------------------------------------------------- /paper/2019KEPLER Facilitating Control-flow Hijacking Primitive Evaluation for Linux Kernel Vulnerabilities.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2019KEPLER Facilitating Control-flow Hijacking Primitive Evaluation for Linux Kernel Vulnerabilities.pdf -------------------------------------------------------------------------------- /paper/2019SLAKE Facilitating Slab Manipulation for Exploiting Vulnerabilities in the Linux Kernel.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2019SLAKE Facilitating Slab Manipulation for Exploiting Vulnerabilities in the Linux Kernel.pdf -------------------------------------------------------------------------------- /paper/2019基于符号执行的Return_to_dl_resolve利用代码自动生成方法_方皓.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2019基于符号执行的Return_to_dl_resolve利用代码自动生成方法_方皓.pdf -------------------------------------------------------------------------------- /paper/2019基于符号执行的缓冲区溢出漏洞自动化利用.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2019基于符号执行的缓冲区溢出漏洞自动化利用.pdf -------------------------------------------------------------------------------- /paper/2019安全漏洞自动利用综述_赵尚儒.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2019安全漏洞自动利用综述_赵尚儒.pdf -------------------------------------------------------------------------------- /paper/2019有限资源条件下的软件漏洞自动挖掘与利用.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2019有限资源条件下的软件漏洞自动挖掘与利用.pdf -------------------------------------------------------------------------------- /paper/2019自动化漏洞利用研究进展_靳宪龙.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2019自动化漏洞利用研究进展_靳宪龙.pdf -------------------------------------------------------------------------------- /paper/2019软件漏洞自动利用研究综述.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2019软件漏洞自动利用研究综述.pdf -------------------------------------------------------------------------------- /paper/2020A Generic Technique for Automatically Finding Defense-Aware Code Reuse Attacks.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2020A Generic Technique for Automatically Finding Defense-Aware Code Reuse Attacks.pdf -------------------------------------------------------------------------------- /paper/2020A Pattern-Based Software Testing Framework for Exploitability Evaluation of Metadata Corruption Vulnerabilities.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2020A Pattern-Based Software Testing Framework for Exploitability Evaluation of Metadata Corruption Vulnerabilities.pdf -------------------------------------------------------------------------------- /paper/2020A Systematic Study of Elastic Objects in Kernel Exploitation.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2020A Systematic Study of Elastic Objects in Kernel Exploitation.pdf -------------------------------------------------------------------------------- /paper/2020AURORA Statistical Crash Analysis for Automated Root Cause Explanation.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2020AURORA Statistical Crash Analysis for Automated Root Cause Explanation.pdf -------------------------------------------------------------------------------- /paper/2020Attacks on Lightweight Hardware-Based Security Primitives.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2020Attacks on Lightweight Hardware-Based Security Primitives.pdf -------------------------------------------------------------------------------- /paper/2020Automatic Generation of Compact Printable Shellcodes for x86.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2020Automatic Generation of Compact Printable Shellcodes for x86.pdf -------------------------------------------------------------------------------- /paper/2020Automatic Techniques to Systematically Discover New Heap Exploitation Primitives.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2020Automatic Techniques to Systematically Discover New Heap Exploitation Primitives.pdf -------------------------------------------------------------------------------- /paper/2020Autosploit A Fully Automated Framework for Evaluating.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2020Autosploit A Fully Automated Framework for Evaluating.pdf -------------------------------------------------------------------------------- /paper/2020EthPloit From Fuzzing to Efficient Exploit Generation against Smart Contracts.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2020EthPloit From Fuzzing to Efficient Exploit Generation against Smart Contracts.pdf -------------------------------------------------------------------------------- /paper/2020Guide Me to Exploit Assisted ROP Exploit Generation for ActionScript Virtual Machine.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2020Guide Me to Exploit Assisted ROP Exploit Generation for ActionScript Virtual Machine.pdf -------------------------------------------------------------------------------- /paper/2020HAEPG An Automatic Multi-hop Exploitation Generation Framework.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2020HAEPG An Automatic Multi-hop Exploitation Generation Framework.pdf -------------------------------------------------------------------------------- /paper/2020HS-Pilot Heap Security Evaluation Tool Model Based on Atomic Heap Interaction.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2020HS-Pilot Heap Security Evaluation Tool Model Based on Atomic Heap Interaction.pdf -------------------------------------------------------------------------------- /paper/2020KOOBE Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2020KOOBE Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities.pdf -------------------------------------------------------------------------------- /paper/2020Relating the Empirical Foundations of Attack Generation and Vulnerability Discovery.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2020Relating the Empirical Foundations of Attack Generation and Vulnerability Discovery.pdf -------------------------------------------------------------------------------- /paper/2020Survey of Methods for Automated Code-Reuse Exploit Generation.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2020Survey of Methods for Automated Code-Reuse Exploit Generation.pdf -------------------------------------------------------------------------------- /paper/2020Tainting-Assisted and Context-Migrated Symbolic Execution of Android Framework for Vulnerability Discovery and Exploit Generation.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2020Tainting-Assisted and Context-Migrated Symbolic Execution of Android Framework for Vulnerability Discovery and Exploit Generation.pdf -------------------------------------------------------------------------------- /paper/2020基于Crash的漏洞利用自动生成系统.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2020基于Crash的漏洞利用自动生成系统.pdf -------------------------------------------------------------------------------- /paper/2020浅谈自动化漏洞利用的发展_刘凯.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2020浅谈自动化漏洞利用的发展_刘凯.pdf -------------------------------------------------------------------------------- /paper/2021A Framework for Automatic Exploit Generation for JIT Compilers.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2021A Framework for Automatic Exploit Generation for JIT Compilers.pdf -------------------------------------------------------------------------------- /paper/2021AngErza Automated Exploit Generation.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2021AngErza Automated Exploit Generation.pdf -------------------------------------------------------------------------------- /paper/2021Demons in the Shared Kernel Abstract Resource Attacks Against OS-level Virtualization.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2021Demons in the Shared Kernel Abstract Resource Attacks Against OS-level Virtualization.pdf -------------------------------------------------------------------------------- /paper/2021EXPRACE Exploiting Kernel Races through Raising Interrupts.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2021EXPRACE Exploiting Kernel Races through Raising Interrupts.pdf -------------------------------------------------------------------------------- /paper/2021End-to-End Automated Exploit Generation for Processor Security Validation.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2021End-to-End Automated Exploit Generation for Processor Security Validation.pdf -------------------------------------------------------------------------------- /paper/2021GUI-Squatting Attack Automated Generation of Android Phishing Apps.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2021GUI-Squatting Attack Automated Generation of Android Phishing Apps.pdf -------------------------------------------------------------------------------- /paper/2021MAZE Towards Automated Heap Feng Shui.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2021MAZE Towards Automated Heap Feng Shui.pdf -------------------------------------------------------------------------------- /paper/2021Shellcode_IA32 A Dataset for Automatic Shellcode Generation.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2021Shellcode_IA32 A Dataset for Automatic Shellcode Generation.pdf -------------------------------------------------------------------------------- /paper/2021Talking About My Generation Targeted DOM-based XSS Exploit.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2021Talking About My Generation Targeted DOM-based XSS Exploit.pdf -------------------------------------------------------------------------------- /paper/2021Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2021Towards Automating Code-Reuse Attacks Using Synthesized Gadget Chains.pdf -------------------------------------------------------------------------------- /paper/2022FUGIO Automatic Exploit Generation for PHP Object Injection Vulnerabilities.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/SmllXzBZ/AEGPaper/HEAD/paper/2022FUGIO Automatic Exploit Generation for PHP Object Injection Vulnerabilities.pdf --------------------------------------------------------------------------------