Bug Hunting Using Symbolic Virtual Machines - Hack.lu 2017
Offered By: Cooper via YouTube
Course Description
Overview
Explore the world of symbolic execution and its applications in reverse engineering, fuzzing, and vulnerability discovery in this 47-minute conference talk from Hack.lu 2017. Learn the basics of using the KLEE symbolic virtual machine to solve complex challenges, including memory corruptions, logical bugs, and obfuscated arithmetic. Discover how symbolic execution, though well-documented in academic papers, remains underutilized by security researchers despite its proven effectiveness in tools like angr. Gain insights from Anto Joseph, a Security Engineer at Intel with extensive experience in mobile and web platform security, as he shares his expertise in this cutting-edge field of cybersecurity.
Syllabus
Hack.lu 2017 Bug hunting using symbolic virtual machines! by Anto Joseph
Taught by
Cooper
Related Courses
Binder - The Bridge To Root - Hongli Han and Mingjian ZhouHack In The Box Security Conference via YouTube JARVIS Never Saw It Coming - Hacking Machine Learning in Speech, Text and Face Recognition
44CON Information Security Conference via YouTube SyScan360'16 Singapore - Memory Corruption Is For Wussies
SyScan360 via YouTube Select Code Execution From Using SQLite
media.ccc.de via YouTube BLEEDINGBIT - Your APs Belong to Us
Black Hat via YouTube