Главная
Study mode:
on
1
WOOT '24 - Introduction to Procedural Debugging through Binary Libification
Description:
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only! Grab it Learn about innovative techniques for debugging memory corruption vulnerabilities in a 16-minute conference talk from WOOT '24. Explore the concepts of "libification" and "procedural debugging" that enable transformation of dynamically linked ELF binaries into shared libraries. Discover how to analyze memory corruption bugs by directly accessing vulnerable functions, effectively separating intraprocedural analysis from reachability problems. Gain insights into an open-source framework designed to implement libification, making these debugging techniques more accessible to the security community. Presented by Jonathan Brossard from the Conservatoire National des Arts et Métiers in Paris, this talk offers practical solutions for assessing and analyzing potential vulnerabilities in compiled software without the need to write complete exploits.

Introduction to Procedural Debugging through Binary Libification

USENIX
Add to list
0:00 / 0:00