The Community for Technology Leaders
RSS Icon
Subscribe
Los Angeles, CA
March 31, 2009 to April 2, 2009
ISBN: 978-0-7695-3507-4
pp: 733-738
ABSTRACT
In this pager we describe a new approach using symbolic execution to exploit windows applications, and the approach is implemented in the tool Ewap. Instead of fuzzing applications with randomly or semi-randomly constructed input, Ewap generates new inputs automatically to steer applications to follow different execution paths and detects security violations dynamically, which maximizes the code coverage and improves the exploiting efficiency.
INDEX TERMS
code instrumentation, taint analysis mechanism, security violations detection, symbolic execution
CITATION
Jianmin Chen, Hui Shu, Xiaobing Xiong, "Ewap: Using Symbolic Execution to Exploit Windows Applications", CSIE, 2009, 2009 WRI World Congress on Computer Science and Information Engineering, CSIE, 2009 WRI World Congress on Computer Science and Information Engineering, CSIE 2009, pp. 733-738, doi:10.1109/CSIE.2009.544
17 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool