Automated Binary Analysis with Pin and Python

Presented at ShmooCon XI (2015), Jan. 17, 2015, 2 p.m. (60 minutes).

Reverse engineering typically involves activities ranging from reading disassembly output to playing with debuggers. However, an often overlooked technique is making use of dynamic binary analysis frameworks. In this talk, we will be looking at Intel's solution, Pin, and walk through how just about anyone can make great use of it. We will discuss reasons why more people should use these tools, some novel uses (including finding bugs and solving ctf challenges automatically!), and even introduce our own python bindings for Pin which will make writing pintools a breeze. Automated binary analysis is an extremely useful technique and we feel that the use of Python and Pin will making jumping in less intimidating by making the process of writing Pin tools a breeze. We will also demonstrate the ease of use by showing some real world examples and tackling some commonly seen issues when dealing with binary analysis.


Presenters:

  • Omar Ahmed
    Tyler is currently a student at NYU-Poly and a member of the ISIS lab. He has done some research projects in the fields of program analysis and vulnerability analysis as well as more general binary analysis. He also enjoys playing reverse engineering and playing in CTF competitions in his free time.
  • Tyler Bohan
    Omar is a recent graduate of NYU-Poly and currently a security engineer at Etsy. He enjoys doing security things such as playing CTF and looking for bugs. He has four cats, none of which are good at computers.

Similar Presentations: