Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore active detection techniques for Dynamic Binary Instrumentation (DBI) in this 45-minute Black Hat conference talk. Delve into methods that exploit weaknesses in DBI tools, such as their inability to handle 32-bit/64-bit cross-mode codes and other bugs. Learn how to go beyond mere detection of DBI environments and discover strategies for escaping their control, effectively reversing the game. Gain insights from speakers Ke Sun and Xiaoning Li as they discuss the importance of DBI transparency in security defense and analyze the limitations of current detection studies. Understand how specifically designed code can target vulnerabilities in DBI tools, providing more effective ways to identify their presence through execution results.