Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale

Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale

Black Hat via YouTube Direct link

Research Background

12 of 29

12 of 29

Research Background

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Why should we analyze firmware
  3. 3 Common vulnerabilities
  4. 4 Protection mechanisms
  5. 5 Firmwares challenges
  6. 6 Dynamic analysis
  7. 7 Dynamic analysis limitations
  8. 8 Static analysis
  9. 9 Firmware is mostly multibinary
  10. 10 Binary architecture
  11. 11 Example
  12. 12 Research Background
  13. 13 Canon Architecture
  14. 14 Firmware Packing
  15. 15 Border Binary
  16. 16 Parsing Score
  17. 17 Binary Dependency Graph
  18. 18 Semantic CPF
  19. 19 The Problem
  20. 20 Insecure Interaction Detection
  21. 21 Data Analysis
  22. 22 Intention
  23. 23 Team dependencies
  24. 24 Evaluation
  25. 25 Experiments
  26. 26 Evaluation Results
  27. 27 Evaluation Results Summary
  28. 28 GitHub
  29. 29 Conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.