In recent years, Microsoft Remote Procedure Call (RPC) and Component Object Model (COM) have become significant focal points in security research due to their vast attack surfaces to LPE and RCE vulnerabilities. The research community has done extensive research in this field. However, prior research have predominantly relied on pre-existing vulnerability patterns, this usually requires a lot of time and effort in reverse engineering. Additionally, fuzzing RPC/COM interfaces typically demands customized corpus and fuzzers tailored to interface definitions for each individual interface, resulting in inefficiency and complexity.... By: R4nger, Fangming Gu & Zhiniang Peng Full Abstract & Presentation Materials: https://ift.tt/pmsBXbE
source https://www.youtube.com/watch?v=VQiQuLo0v58
Subscribe to:
Post Comments (Atom)
-
Germany recalled its ambassador to Russia for a week of consultations in Berlin following an alleged hacker attack on Chancellor Olaf Scho...
-
Android’s May 2024 security update patches 38 vulnerabilities, including a critical bug in the System component. The post Android Update ...
No comments:
Post a Comment