Automated Exploit Chain Modeling and Analysis
DOI:
https://doi.org/10.34190/iccws.21.1.4432Keywords:
exploits, exploit chains, vulnerabilities, Android, formal modeling, automated analysisAbstract
We describe early-stage research and tool development efforts to formally model and analyze exploit chains. These are sequences of exploits carefully crafted by an attacker to achieve an elaborate end-goal, such as an escalation of privileges of the executing thread. In this work, we are taking a systematic approach to constructing formal models of exploit chains in the form of finite-state machines, which are then converted into constraint-based semantic representations or timed automata, in order to analyze chains against metrics such as effectiveness, ease of reproduction, and stability under system variations.
Downloads
Published
Issue
Section
License
Copyright (c) 2026 Thomas Wahl, Nicolas White, Guang Jin, Sukarno Mertoguno, Kevin Stevens, Froy Maldonado

This work is licensed under a Creative Commons Attribution-NoDerivatives 4.0 International License.