Automated Exploit Chain Modeling and Analysis

Authors

  • Thomas Wahl Trusted Science and Technology, Inc.
  • Nicolas White
  • Guang Jin
  • Sukarno Mertoguno
  • Kevin Stevens
  • Froy Maldonado

DOI:

https://doi.org/10.34190/iccws.21.1.4432

Keywords:

exploits, exploit chains, vulnerabilities, Android, formal modeling, automated analysis

Abstract

We describe early-stage research and tool development efforts to formally model and analyze exploit chains. These are sequences of exploits carefully crafted by an attacker to achieve an elaborate end-goal, such as an escalation of privileges of the executing thread. In this work, we are taking a systematic approach to constructing formal models of exploit chains in the form of finite-state machines, which are then converted into constraint-based semantic representations or timed automata, in order to analyze chains against metrics such as effectiveness, ease of reproduction, and stability under system variations.

Author Biographies

Thomas Wahl, Trusted Science and Technology, Inc.

Dr. Thomas Wahl is a Senior Principal Scientist at Trusted ST. He received a PhD from the University of Texas at Austin. From 2011, Dr. Wahl worked as a professor at Northeastern University, graduating several PhD students in Formal Methods. Before joining Trusted ST, he was Principal Researcher at GrammaTech.

Nicolas White

Nicholas White is an undergraduate student at Northeastern University, Boston, where he is pursuing a B.S. in Cybersecurity with a minor in Political Science as well as an M.S. in Cybersecurity. His research interests include network security, system security, cryptography, and digital privacy. His website is ncwht.com.

Guang Jin

Dr. Guang Jin is a Principal Scientist at Trusted ST specializing in cyber security, software analysis, and formal methods. He has led more than 20 DoD-funded SBIR and BAA programs and is recognized for advancing hardware and software security properties and applying rigorous techniques to next-generation cyber defense and analytics.

Sukarno Mertoguno

Dr. Sukarno Mertoguno is a research professor at Georgia Tech University. He received his Ph.D. from SUNY-Binghamton. His education background includes theoretical physics and electrical engineering. Before joining Georgia Tech, Dr. Mertoguno managed basic and applied science research in cybersecurity and complex software for The Office of Naval Research (ONR).

Kevin Stevens

Kevin Stevens is a graduate research assistant at Georgia Tech specializing in systems security and binary analysis. He was a member of the winning team of DARPA's AIxCC competition in 2025, and the second-place team of DEF CON CTF in 2023, 2024, and 2025.

Froy Maldonado

Froylan Maldonado is a scientist at the Naval Information Warfare Center Pacific (NIWC PAC) with experience in cybersecurity, reverse engineering, software development and exploit formalization. He is also a graduate student at Georgia Tech, where he conducts research on exploit formalization under Dr. Sukarno Mertoguno.

Downloads

Published

19-02-2026