Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security 2021
DOI: 10.1145/3460120.3484564
|View full text |Cite
|
Sign up to set email alerts
|

SyzGen: Automated Generation of Syscall Specification of Closed-Source macOS Drivers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(3 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…Recent exploit generation papers [14], [46] have not yet open-sourced or just a subset of their verified dynamic traces. K-LEAK will benefit from recent work that automates the recovery of syscall interfaces [12], [18], [25] and performs better kernel fuzzing [45], [52], which can facilitate the generation of more dynamic traces. Also, our dynamic symbolic execution requires a dynamic trace to begin with.…”
Section: Discussion and Future Workmentioning
confidence: 99%
“…Recent exploit generation papers [14], [46] have not yet open-sourced or just a subset of their verified dynamic traces. K-LEAK will benefit from recent work that automates the recovery of syscall interfaces [12], [18], [25] and performs better kernel fuzzing [45], [52], which can facilitate the generation of more dynamic traces. Also, our dynamic symbolic execution requires a dynamic trace to begin with.…”
Section: Discussion and Future Workmentioning
confidence: 99%
“…The synthesis of information detected by multiple sensors, when combined and complemented, addresses the limitations of individual sensors under external influences. This collaborative approach mitigates the risk of decision errors and enhances overall recognition capabilities (16)(17)(18)(19).…”
Section: Multi-sensor Information Fusion 3 1 Multi-sensor Information...mentioning
confidence: 99%
“…In recent years, the use of continuous fuzzing, e.g., syzbot [40], has exposed thousands of Linux kernel bugs to the public. With the improvements of kernel fuzzing techniques [64], [31], [41], [69], [35], [63], even more bugs may be exposed in the future. Considering the enormous volume of kernel bugs, conducting manual inspections to assess the exploitability of every single one is unrealistic.…”
Section: Introductionmentioning
confidence: 99%