Your Exploit is Mine - Automatic Shellcode Transplant for Remote Exploits
Offered By: IEEE via YouTube
Course Description
Overview
          Explore a cutting-edge technique for adapting remote exploits through automatic shellcode transplantation in this 19-minute IEEE conference talk. Delve into the challenges of developing remote exploits and learn how attackers can efficiently modify existing exploits by replacing the original shellcode. Discover ShellSwap, an innovative system that overcomes limitations of current automated shellcode placement methods using symbolic tracing, shellcode layout remediation, and path kneading. Examine the system's impressive 88% success rate in generating exploits across 100 test cases, combining 20 exploits with 5 independently developed shellcode pieces. Gain insights into the complexities of exploit development, defense mechanism bypassing, and the potential implications for cybersecurity.
        
Syllabus
Your Exploit is Mine: Automatic Shellcode Transplant for Remote Exploits
Taught by
IEEE Symposium on Security and Privacy
Tags
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network
