WORKSHOP: Symbolic Execution: No need to be angr-y

Presented at BSides Austin 2016, April 1, 2016, 2 p.m. (90 minutes).

Symbolic execution provides reverse engineers and vulnerability researchers alike another tool to facilitate analysis. In our talk, we discuss the basics of symbolic execution and provide a few demos of what symbolic execution is capable of using the open source angr framework. These demos include reverse engineering, diffusing a binary bomb, and automatically exploiting vulnerable code.


Presenters:

  • Cory Duplantis
    Cory Duplantis is a senior security engineer at Praetorian and plays on Samurai for capture the flag competitions. Being happily married to his high school sweetheart, CTFs, tool development, and singing barbershop take up the majority of his time. He actively contributes CTF writeups back to the community and was recently awarded the Best Technical Writeup for the SANS HolidayHack 2015 challenge.
  • Anthony Weems

Links:

Similar Presentations: