Главная
Study mode:
on
1
Introduction
2
Julian Cohen
3
Program Analysis
4
Vulnerability Research
5
Vulnerability Discovery
6
Presentation Goal
7
Metacharacter Injection
8
Command Injection
9
Type Confusion
10
Implicit Type Conversion Vulnerability
11
Implicit Type Conversion
12
Buffer Overflow
13
Rats
14
FAL Grind
15
BAL Grind
16
QuickSEC
17
After Free Vulnerability
18
Aurora Center
19
Aurora UAF
20
Symbolic Execution
21
Constraint Solving
22
Klee
23
CLE
24
CLE Demo
25
Symbolic Execution Engines
26
Static Analysis Platforms
27
Conclusion
28
Thanks
29
Questions
Description:
Explore the world of contemporary automatic program analysis in this 42-minute Black Hat conference talk by Julian Cohen. Delve into the history of program analysis, tracing its evolution from manual techniques to automated methods for discovering vulnerabilities and reasoning about code. Learn how to leverage existing program analysis tools and techniques to automatically find vulnerabilities in various systems. Discover the cutting-edge advancements in the field, including how minor modifications to existing projects and small scripts can lead to world-class vulnerability discoveries. Gain practical insights through code examples and demonstrations, covering topics such as metacharacter injection, command injection, type confusion, buffer overflow, and symbolic execution. Access accompanying online reference material to further enhance your understanding of automatic program analysis and its applications in cybersecurity.

Contemporary Automatic Program Analysis

Black Hat
Add to list
0:00 / 0:00