[PDF][PDF] Driller: Augmenting Fuzzing Through Selective Symbolic Execution

N Stephens - 2016 - jacopo.cc
Memory corruption vulnerabilities are an everpresent risk in software, which attackers can
exploit to obtain unauthorized access to confidential information. As products with access to
sensitive data are becoming more prevalent, the number of potentially exploitable systems is
also increasing, resulting in a greater need for automated software vetting tools. DARPA
recently funded a competition, with millions of dollars in prize money, to further research
focusing on automated vulnerability finding and patching, showing the importance of …