Proceedings 2024 Network and Distributed System Security Symposium 2024
DOI: 10.14722/ndss.2024.24935
|View full text |Cite
|
Sign up to set email alerts
|

K-LEAK: Towards Automating the Generation of Multi-Step Infoleak Exploits against the Linux Kernel

Zhengchuan Liang,
Xiaochen Zou,
Chengyu Song
et al.

Abstract: The severity of information leak (infoleak for short) in OS kernels cannot be underestimated, and various exploitation techniques have been proposed to achieve infoleak in OS kernels. Among them, memory-error-based infoleak is powerful and widely used in real-world exploits. However, existing approaches to finding memory-error-based infoleak lack the systematic reasoning about its search space, and do not fully explore the search space. Consequently, they fail to exploit a large number of memory errors in the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 27 publications
0
1
0
Order By: Relevance
“…Oil spill puts the people and environment in danger [27]. It is better to be prepared for a spill than to be caught unaware by it [28]. Environmental assessment and sensitivity index mapping is one of the established processes used to prepare for oil spills disaster management [29].…”
Section: Introductionmentioning
confidence: 99%
“…Oil spill puts the people and environment in danger [27]. It is better to be prepared for a spill than to be caught unaware by it [28]. Environmental assessment and sensitivity index mapping is one of the established processes used to prepare for oil spills disaster management [29].…”
Section: Introductionmentioning
confidence: 99%