YoVDO

Bug Hunting Using Symbolic Virtual Machines - Hack.lu 2017

Offered By: Cooper via YouTube

Tags

Symbolic Execution Courses Cybersecurity Courses Reverse Engineering Courses Fuzzing Courses Memory Corruption Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the world of symbolic execution and its applications in reverse engineering, fuzzing, and vulnerability discovery in this 47-minute conference talk from Hack.lu 2017. Learn the basics of using the KLEE symbolic virtual machine to solve complex challenges, including memory corruptions, logical bugs, and obfuscated arithmetic. Discover how symbolic execution, though well-documented in academic papers, remains underutilized by security researchers despite its proven effectiveness in tools like angr. Gain insights from Anto Joseph, a Security Engineer at Intel with extensive experience in mobile and web platform security, as he shares his expertise in this cutting-edge field of cybersecurity.

Syllabus

Hack.lu 2017 Bug hunting using symbolic virtual machines! by Anto Joseph


Taught by

Cooper

Related Courses

Applied ChatGPT for Cybersecurity
Infosec via Coursera
Become an Influencer at Work
CreativeLive
Fundamentos de Ciberseguridad: un enfoque práctico
Inter-American Development Bank via edX
Advanced Malware Analysis: Redux
Cybrary
How to Use GDB (BSWJ)
Cybrary