Simplifying the art of instrumentation

Presented at BruCON 0x0A (2018), Oct. 4, 2018, 10:30 a.m. (120 minutes)

1. Source instrumentation & Binary instrumentation 2. Static a. Compile time instrumentation i. LLVM ii. AFL instrumentation use case b. Binary rewriting 3. Dynamic instrumentation a. Introduction b. PIN c. Dynamo Rio d. DynInst 4. Application of instrumentation in the domain of security: a. Coverage tracing b. Aiding reverse engineering c. Vulnerability discovery d. Malware analysis e. Taint analysis f. Debugging g. Data flow analysis h. Control flow analysis

Presenters:

  • Krishnakant B. Patil
    Krishnakant: is a vulnerability researcher by profession. Yet, he is best known amongst the security researchers for his cutting edge capabilities and skills in reverse engineering, exploit development and malware analysis. He had successfully conducted many workshops and hands on sessions on malware analysis and reverse engineering and is developer of DECEPTICON (An intelligent evil twin tool, BruCON 2016).
  • Rushikesh D. Nandedkar
    Rushikesh is a security analyst. Having more than six years of experience under his belt, his assignments have always been pointed towards reducing the state of insecurity for information. His research papers were accepted at NCACNS 2013, nullcon 2014, HITCON 2014, Defcamp 2014, BruCON 2015, DEFCON 24, BruCON 2016, x33fcon 2017, c0c0n-X 2017, BruCON 2017, Bsides Delhi 2017, nullcon 2018, x33fcon 2018, BlackHat USA 2018 and DEFCON 26 + Co-author of "DECEPTICON," an intelligent evil-twin. Being an avid CTF player, for him, solace is messing up with packets, frames, and shellcodes.

Links:

Similar Presentations: