The Fifth HOPE (2004): "Security Through Automated Binary Analysis" (Download)
Friday, July 9, 2004: 11:00 am (Area "A"): Automated binary analysis techniques have become sufficiently advanced so that having the source to software is no longer a prerequisite for finding security flaws. The binary is equivalent to the source. And a patch is equivalent to a detailed description of a security flaw. This talk will cover the implications of the latest binary analysis technology and give an overview of some of the technology available.
Hosted by Dildog and Weld Pond
Hosted by Dildog and Weld Pond