Pwning Intel PIN
Offered By: Recon Conference via YouTube
Course Description
Overview
Explore a critical examination of Dynamic Binary Instrumentation (DBI) frameworks in this conference talk from Recon 2018 Montreal. Delve into the security implications of using DBI tools, particularly Intel PIN, for binary analysis and hardening techniques. Learn how the speakers challenge assumptions about isolation and stealthiness in DBI frameworks, demonstrating methods to detect their presence, circumvent binary hardening policies, and exploit vulnerabilities when programs run within Intel PIN. Gain insights into the potential risks of relying on DBI for security-related tasks, and understand how these frameworks can inadvertently introduce new attack vectors. Discover the research findings, including proof of concepts and technical details, that highlight the need for a more cautious approach when using DBI tools in security-sensitive environments.
Syllabus
Recon 2018 Montreal - Pwning Intel PIN by Julian Kirsch and Zhechko Zhechev
Taught by
Recon Conference
Related Courses
Practical Uses of Program Analysis - Automatic Exploit GenerationNorthSec via YouTube Dynamic Binary Instrumentation Techniques to Address Native Code Obfuscation
Black Hat via YouTube Security Instrumentation - The Future of Software Security
LASCON via YouTube Android Rootkits - Analysis from Userland and Kernelland
RSA Conference via YouTube Finding 0days in Embedded Systems with Code Coverage Guided Fuzzing
BruCON Security Conference via YouTube