YoVDO

Transforming Open Source to Open Access in Closed Applications

Offered By: Recon Conference via YouTube

Tags

REcon Conference Courses

Course Description

Overview

Explore the security implications of incorporating open-source components into closed-source applications in this 41-minute conference talk from Recon 2017 Brussels. Delve into the examination of Adobe Reader's XSLT engine, based on the open-source Sablotron project, to understand potential vulnerabilities. Learn techniques for auditing source code and matching source-to-binary to identify vulnerable conditions. Discover real-world examples of code execution vulnerabilities in Adobe Reader's codebase. Gain insights from industry experts Brian Gorenc, Jasiel Spelman, and Abdul-Aziz Hariri as they discuss trends in vulnerabilities found in Adobe Reader's XSLT engine over the past year and highlight the importance of understanding security side effects when leveraging open-source components in proprietary systems.

Syllabus

Recon 2017 Brussels - Transforming Open Source to Open Access in Closed Applications


Taught by

Recon Conference

Related Courses

Harnessing Intel Processor Trace on Windows for Fuzz
Recon Conference via YouTube
Reverse Engineering Satellite Based IP Content Distribution
Recon Conference via YouTube
Reverse Engineering Windows Defender's JavaScript Engine
Recon Conference via YouTube
DIY ARM Debugger for Wi-Fi Chips
Recon Conference via YouTube
Subverting Your Server Through Its BMC - The HPE iLO4 Case
Recon Conference via YouTube