Explore the process of identifying ubiquitous third-party libraries in compiled executables through a comprehensive IEEE conference talk. Delve into firmware indicator translation, system layer taxonomy, and vulnerabilities across different layers. Examine the OpenNTPD case study as an example of ubiquitous library vulnerability. Learn about Disco, a feature engineering tool for machine learning, and its application in identifying ubiquitous libraries. Gain insights into classification and similarity ranking techniques used in this field. Conclude with an overview of current research and future directions in this critical area of cybersecurity.
Identifying Ubiquitous Third Party Libraries in Compiled Executables Using Annotated and Translated