CALL, RET, CALL, CALL, RET: Runtime Tracing with Dynamic Binary Instrumentation

Presented at Summercon 2010, June 18, 2010, 1 p.m. (60 minutes).

No description available.

Presenters:

  • Alexander Sotirov
    Alexander Sotirov is an independent security researcher with more than ten years of experience with vulnerability research, reverse engineering and advanced exploitation techniques. His most recent work includes exploiting MD5 collisions to create a rogue Certificate Authority, bypassing the exploitation mitigations on Windows Vista and developing the Heap Feng Shui browser exploitation technique. His professional experience includes positions as a security researcher at Determina and VMware. Currently he is working as an independent security consultant in New York. He is a regular speaker at security conferences around the world, including CanSecWest, BlackHat and Recon. Alexander is a program chair of the USENIX Workshop on Offensive Technologies and is one of the founders of the Pwnie Awards.

Similar Presentations: