1. 10

An interesting set of slides; the author uses Symbolic Execution via Klee to model various aspects of routers and discover actual, exploitable bugs within routers.

  1.  

  2. 3

    I was going to ask questions about “the kernel stack is executable”, but then I saw “MIPS”

    1. 2

      Interestingly, @brucem and I had that conversation point this morning as well, since MIPS limits options with certain things, but also brings new restrictions.