Skip to content

Commit add51a2

Browse files
authored
Update README.md (#30)
Add paper details
1 parent c196348 commit add51a2

File tree

1 file changed

+20
-0
lines changed

1 file changed

+20
-0
lines changed

README.md

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -137,3 +137,23 @@ The second type is used for asserting read/write invariants. These functions tak
137137
the bitvector corresponding to the read/write address, as well as the state the read/write is being performed on.
138138
Any time a chain reads or writes from memory, the procedure will automatically call these functions and assert the returned
139139
booleans. This can allow for setting safe/unsafe ranges of memory or even the register space.
140+
141+
# Research Paper
142+
143+
`crackers` was developed in support of our research paper _Synthesis of Code-Reuse Attacks from `p-code` Programs_.
144+
You can find the author accepted manuscript [here](https://ora.ox.ac.uk/objects/uuid:906d32ca-407c-4cab-beab-b90200f81d65).
145+
This work has been accepted to Usenix Security 2025.
146+
147+
You can cite this work with the following BibTex:
148+
149+
```bibtex
150+
@inproceedings {denhoed2025synthesis,
151+
author = {Mark DenHoed and Thomas Melham},
152+
title = {Synthesis of Code-Reuse Attacks from p-code Programs},
153+
booktitle = {34th USENIX Security Symposium (USENIX Security 25)},
154+
year = {2025},
155+
address = {Seattle, WA},
156+
publisher = {USENIX Association},
157+
month = aug
158+
}
159+
```

0 commit comments

Comments
 (0)