YoVDO

Cross-Architecture Bug Search in Binary Executables

Offered By: IEEE via YouTube

Tags

IEEE Symposium on Security and Privacy Courses Cybersecurity Courses x86 Architecture Courses ARM Architecture Courses Vulnerability Assessment Courses CPU Architecture Courses

Course Description

Overview

Explore a groundbreaking approach to identifying security vulnerabilities across different CPU architectures in this 23-minute IEEE conference talk. Discover how to derive bug signatures for known vulnerabilities and apply them to find similar issues in binaries deployed on diverse platforms like x86, ARM, and MIPS. Learn about the challenges of comparing incompatible instruction set architectures and the innovative solutions, including translating binary code to an intermediate representation and sampling concrete inputs to capture basic block semantics. Gain insights into the practical applications of this method, such as detecting Heartbleed vulnerabilities and uncovering backdoors in closed-source router firmware. Understand the potential impact of this cross-architecture bug search technique on improving security assessments for closed-source software and embedded devices.

Syllabus

Cross-Architecture Bug Search in Binary Executables


Taught by

IEEE Symposium on Security and Privacy

Tags

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network