Brumley, Poosankam, Song & Zheng. Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications. ã«ã¼ãã®ã¼ã¡ãã³å¤§å¦ã®ç ç©¶è
ã«ããï¼ããããã exploit ãèªåçæããæè¡ã®è«æããããã«ãã£ã¦å¤æ´ãããç®æãè§£æãããã¨ã«ããï¼ãããé©ç¨åã®ããã°ã©ã ã«åå¨ãã¦ããèå¼±æ§ãè¦ã¤ãåºãï¼ã¨ãããã®ã å®éã«ãã®æè¡ã Microsoft ã®ï¼ã¤ã®ããã°ã©ã ã«å¯¾ãã¦é©ç¨ãã¦ã¿ãã¨ããï¼ãã®ãããããã exploit ãçæãããã¨ãã§ããããããï¼ãã®ãã¡ï¼ã¤ã¯ï¼å
¬ã«ã¯èå¼±æ§ãç¥ããã¦ããªããã®ã ã£ãã¨ããã ãã®æè¡ã«ãã£ã¦çæãããã¨ãã§ããã®ã¯ï¼ããã¾ã§ãããããé©ç¨åã®ããã°ã©ã ã«å¯¾ãã exploitãã§ãã£ã¦ï¼ã²ã¨ãã³ããããå½ã¦ããã¦
{{#tags}}- {{label}}
{{/tags}}