Jim Alves-Foss - University of Idaho
Students: Spring 2025, unless noted otherwise, sessions will be virtual on Zoom.
Automated Function Boundary Detection in Stripped Binaries
Apr 06, 2022
Download:

Abstract
Automated cyber defense tools require the ability to analyze binary applications, detect vulnerabilities and automatically patch or mitigate those vulnerabilities. The insertion of security mechanisms that operate at function boundaries (e.g, control flow mitigation, stack guards)require automated detection of those boundaries. This talk discusses the problem, related research and a new technique that is more accurate than other reported approaches. The presentation also discusses some of the limitations and ramifications of typical approaches compare and present these types of experimental results.
About the Speaker

Ways to Watch
