Security Through Automated Binary Analysis presented at The Fifth HOPE 2004

by Weld Pond, Dildog ,

Tags: Security Analysis

Summary : Automated binary analysis techniques have become sufficiently advanced so that having the source to software is no longer a prerequisite for finding security flaws. The binary is equivalent to the source. And a patch is equivalent to a detailed description of a security flaw. This talk will cover the implications of the latest binary analysis technology and give an overview of some of the technology available.