YoVDO

Pwning Intel PIN

Offered By: Recon Conference via YouTube

Tags

REcon Conference Courses Cybersecurity Courses Reverse Engineering Courses Dynamic Binary Instrumentation Courses

Course Description

Overview

Explore a critical examination of Dynamic Binary Instrumentation (DBI) frameworks in this conference talk from Recon 2018 Montreal. Delve into the security implications of using DBI tools, particularly Intel PIN, for binary analysis and hardening techniques. Learn how the speakers challenge assumptions about isolation and stealthiness in DBI frameworks, demonstrating methods to detect their presence, circumvent binary hardening policies, and exploit vulnerabilities when programs run within Intel PIN. Gain insights into the potential risks of relying on DBI for security-related tasks, and understand how these frameworks can inadvertently introduce new attack vectors. Discover the research findings, including proof of concepts and technical details, that highlight the need for a more cautious approach when using DBI tools in security-sensitive environments.

Syllabus

Recon 2018 Montreal - Pwning Intel PIN by Julian Kirsch and Zhechko Zhechev


Taught by

Recon Conference

Related Courses

Practical Uses of Program Analysis - Automatic Exploit Generation
NorthSec via YouTube
Dynamic Binary Instrumentation Techniques to Address Native Code Obfuscation
Black Hat via YouTube
Security Instrumentation - The Future of Software Security
LASCON via YouTube
Android Rootkits - Analysis from Userland and Kernelland
RSA Conference via YouTube
Finding 0days in Embedded Systems with Code Coverage Guided Fuzzing
BruCON Security Conference via YouTube