YoVDO

DPTrace - Dual Purpose Trace for Exploitability Analysis of Program Crashes

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Security Research Courses Memory Corruption Courses

Course Description

Overview

Explore a comprehensive research presentation on determining the practical exploitability of software issues through crash analysis. Delve into a semi-automated crash analysis framework designed to augment researchers' efforts in triaging exploitability and impact of program crashes. Learn about the combination of backward and forward taint propagation systems, and how they integrate into a single framework that maps input areas influencing crashes and analyzes potential code execution capabilities. Discover the implementation of two functional tools, including DPTrace, and witness demonstrations using public vulnerabilities. Gain insights into the challenges faced by exploit writers and product security teams in the era of advanced fuzzing frameworks and modern protection mechanisms.

Syllabus

Intro
Agenda
Objectives
Current State of Affairs
Taint Analysis for Program Crashes
History and Lore
State Transition for Memory Corruption
Backward Taint Analysis
Forward Taint Analysis
Fake Memory Structure Sample
Implementation Details
Sample Analysis on dead bugs
Sample Analysis 1
Sample Analysis 2
Sample Analysis 3
Challenges & Limitations


Taught by

Black Hat

Related Courses

Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security Chip
Black Hat via YouTube
Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube
AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube
Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube
Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube