Rating is available when the video has been rented.
This feature is not available right now. Please try again later.
Published on Dec 8, 2010
Demonstration of the AEG exploits from our NDSS paper entitled "AEG: Automatic Exploit Generation". Please see http://security.ece.cmu.edu/aeg for more information.
All the programs have reported security vulnerabilities (though we did find 2 new ones), and all have CVE numbers. Please check out the above site for more information. In the video, for effect, we have made some of the programs setuid in order to demonstrate the end effect of how an exploit may result in privilege escalation. Of course the effect of a real attack would depend upon the particular configuration of the attacked system.