emulation-driven reverse-engineering for finding vulns

Presented at DEF CON 30 (2022), Aug. 14, 2022, 11 a.m. (45 minutes)

do your eyes hurt? is your brain aching? is your pain caused from too much deciphering difficult assembly (or decompiled C) code? assembly can hurt, C code can be worse. partial emulation to the rescue! let the emulator walk you through the code, let it answer hard questions/problems you run into in your reversing/vuln research. this talk will introduce you the power of emulator-driven reversing. guide your RE with the help of an emulator (one that can survive limited context), emulate code you don't want to reverse, be better, learn more, be faster, with less brain-drain. make no mistake, RE will always have room for magicians to show their wizardry... but after this talk, you may find yourself a much more powerful wizard.

Presenters:

  • Gavin Mead / atlas - chief pwning officer, 0fd00m c0rp0ration   as atlas
    atlas is a binary ninja who's been working to improve his understanding of this digital world for nearly two decades. firmware, software, hardware, rf, protocols, it's all fun to him. after all these years, he still enjoys making sense of low level things and bringing along friends who share the passion. background in development, client/server admin, hardware reversing, software reversing, vulnerability research, exploiting things in SCADA/ICS, Power Grid, Automotive, Medical, Aerospace, and devving tools to make it all easier, faster, and more consistent.

Links:

Similar Presentations: