The paper discusses innovative methodologies for assessing the exploitability of memory corruption vulnerabilities in compiled software through techniques called 'libification' and 'procedural debugging.' These methods transform dynamically linked ELF binaries into shared libraries, allowing partial debugging of binaries at a procedural level. A framework named the 'witchcraft linker' is also introduced to facilitate these processes while adhering to an open-source license for community use.
Related topics: