Skip to content

Instantly share code, notes, and snippets.

@quend
Last active March 26, 2016 01:49
Show Gist options
  • Star 2 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save quend/f0450a3a3edafab1ff5c to your computer and use it in GitHub Desktop.
Save quend/f0450a3a3edafab1ff5c to your computer and use it in GitHub Desktop.
Existing AE work focused on Restricted Models:
Sean Heelan’s “Automatic Generation of Control Flow Hijacking Exploits for Software Vulnerabilities”
David Brumley (@ Carnegie Mellon) et al. (AEG, MAYHEM, etc)
Most whitepapers on Cyber Grand Challenge! (CGC)
[Good Course Material]
https://www.cs.umd.edu/class/spring2013/cmsc631/lectures/symbolic-exec.pdf
https://www.utdallas.edu/~zxl111930/spring2012/public/lec4.pdf
http://web.mit.edu/16.399/www/lecture_01-intro/Cousot_MIT_2005_Course_01_4-1.pdf
http://homepage.cs.uiowa.edu/~tinelli/classes/seminar/Cousot.pdf
[Site for Tools]
https://github.com/angr/angr-doc
https://github.com/llvm-mirror/llvm
http://triton.quarkslab.com/
[Other Good Resources]
http://www.grammatech.com/blog/hybrid-concolic-execution-part-1
http://openwall.info/wiki/_media/people/jvanegue/files/aegc_vanegue.pdf
@aidielse
Copy link

👍

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment