An interesting set of slides; the author uses Symbolic Execution via Klee to model various aspects of routers and discover actual, exploitable bugs within routers.
Interestingly, @brucem and I had that conversation point this morning as well, since MIPS limits options with certain things, but also brings new restrictions.
I was going to ask questions about “the kernel stack is executable”, but then I saw “MIPS”
Interestingly, @brucem and I had that conversation point this morning as well, since MIPS limits options with certain things, but also brings new restrictions.