Главная
Study mode:
on
1
Introduction
2
Overview
3
Workflow
4
Assembly
5
SSA
6
Binary Ninja
7
Binary Ninja Plugin
8
Kraken
9
Walks
10
Ontology
11
Inference
12
Query Language
13
Hunting
14
Undefined
15
Binary Ninja Image
16
Union
17
Comments
18
DARPA CyberGrand Challenge
19
DARPA
20
Buffer Overflow
21
Challenges
22
Source Code
23
Function Node
24
Running Kraken
25
Tool Set
26
PM Analyze
27
PM Analyze Output
28
Migration
29
CWE Scripts
30
What does this mean
31
What does this tell us
32
What I want out of this
Description:
Explore advanced techniques for discovering vulnerabilities in binary targets using knowledge graphs and static analysis. Learn about the workflow involving Assembly, SSA, Binary Ninja, and the Binary Ninja Plugin. Dive into the Kraken system, ontology, inference, and query language for hunting undefined behaviors. Examine the DARPA Cyber Grand Challenge, buffer overflow challenges, and source code analysis. Understand function nodes, running Kraken, tool sets, PM Analyze, and output interpretation. Discover the importance of CWE scripts and migration in vulnerability detection. This 48-minute conference talk from Derbycon 7 (2017) provides valuable insights into cutting-edge methods for enhancing binary security analysis.

Aiding Static Analysis - Discovering Vulnerabilities in Binary Targets through Knowledge Graph

Add to list
0:00 / 0:00