Towards Automated Generation of Exploitation Primitives for Web Browsers
Introduction This is a paper published in ACSAC 2018. In this paper, the author introduces a method to automatically generate exploitation primitives during the web browser exploitation. In this paper, the author uses CVE-2016-9079 as an example to demonstrate their work, which happens to be analysed in my post before. In this post, I’d like […]