This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
2009 WRI World Congress on Computer Science and Information Engineering
Ewap: Using Symbolic Execution to Exploit Windows Applications
Los Angeles, California USA
March 31-April 02
ISBN: 978-0-7695-3507-4
In this pager we describe a new approach using symbolic execution to exploit windows applications, and the approach is implemented in the tool Ewap. Instead of fuzzing applications with randomly or semi-randomly constructed input, Ewap generates new inputs automatically to steer applications to follow different execution paths and detects security violations dynamically, which maximizes the code coverage and improves the exploiting efficiency.
Index Terms:
code instrumentation, taint analysis mechanism, security violations detection, symbolic execution
Citation:
Jianmin Chen, Hui Shu, Xiaobing Xiong, "Ewap: Using Symbolic Execution to Exploit Windows Applications," csie, vol. 7, pp.733-738, 2009 WRI World Congress on Computer Science and Information Engineering, 2009
Usage of this product signifies your acceptance of the Terms of Use.