Pwning Intel PIN
Offered By: Recon Conference via YouTube
Course Description
Overview
Explore a critical examination of Dynamic Binary Instrumentation (DBI) frameworks in this conference talk from Recon 2018 Montreal. Delve into the security implications of using DBI tools, particularly Intel PIN, for binary analysis and hardening techniques. Learn how the speakers challenge assumptions about isolation and stealthiness in DBI frameworks, demonstrating methods to detect their presence, circumvent binary hardening policies, and exploit vulnerabilities when programs run within Intel PIN. Gain insights into the potential risks of relying on DBI for security-related tasks, and understand how these frameworks can inadvertently introduce new attack vectors. Discover the research findings, including proof of concepts and technical details, that highlight the need for a more cautious approach when using DBI tools in security-sensitive environments.
Syllabus
Recon 2018 Montreal - Pwning Intel PIN by Julian Kirsch and Zhechko Zhechev
Taught by
Recon Conference
Related Courses
Harnessing Intel Processor Trace on Windows for FuzzRecon Conference via YouTube Reverse Engineering Satellite Based IP Content Distribution
Recon Conference via YouTube Reverse Engineering Windows Defender's JavaScript Engine
Recon Conference via YouTube DIY ARM Debugger for Wi-Fi Chips
Recon Conference via YouTube Subverting Your Server Through Its BMC - The HPE iLO4 Case
Recon Conference via YouTube