File tree Expand file tree Collapse file tree 1 file changed +20
-0
lines changed
Expand file tree Collapse file tree 1 file changed +20
-0
lines changed Original file line number Diff line number Diff line change @@ -137,3 +137,23 @@ The second type is used for asserting read/write invariants. These functions tak
137137the bitvector corresponding to the read/write address, as well as the state the read/write is being performed on.
138138Any time a chain reads or writes from memory, the procedure will automatically call these functions and assert the returned
139139booleans. This can allow for setting safe/unsafe ranges of memory or even the register space.
140+
141+ # Research Paper
142+
143+ ` crackers ` was developed in support of our research paper _ Synthesis of Code-Reuse Attacks from ` p-code ` Programs_ .
144+ You can find the author accepted manuscript [ here] ( https://ora.ox.ac.uk/objects/uuid:906d32ca-407c-4cab-beab-b90200f81d65 ) .
145+ This work has been accepted to Usenix Security 2025.
146+
147+ You can cite this work with the following BibTex:
148+
149+ ``` bibtex
150+ @inproceedings {denhoed2025synthesis,
151+ author = {Mark DenHoed and Thomas Melham},
152+ title = {Synthesis of Code-Reuse Attacks from p-code Programs},
153+ booktitle = {34th USENIX Security Symposium (USENIX Security 25)},
154+ year = {2025},
155+ address = {Seattle, WA},
156+ publisher = {USENIX Association},
157+ month = aug
158+ }
159+ ```
You can’t perform that action at this time.
0 commit comments