This document discusses CRAX, an automatic exploit generating system built by members of the Software Quality Laboratory (SQLab) at NCTU. It provides background on Lance Chen and the SQLab, which takes the approach that bugs are backdoors. It then explains the symbolic execution techniques used by CRAX to reason about program crashes and generate exploits, such as using the S2E platform combining concrete and symbolic execution. The document shows placeholder slides on the progress of generating exploits and challenges like ASLR and non-executable stack protections. It concludes by asking if there are any questions.