Stuck in Tutorial Hell? Learn Backend Dev the Right Way
Live Online Classes in Design, Coding & AI — Small Classes, Free Retakes
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore advanced reverse engineering techniques for identifying root cause vulnerabilities in exploited 0-day attacks. This 42-minute conference talk from Black Hat delves into Project Zero's analysis of eleven 0-day vulnerabilities exploited in the wild over a 12-month period. Learn about various methods employed, including binary patch diffing, exploit sample minimization, source code patch diffing, manual reverse engineering, and targeted bug hunting. Gain insights into the critical process of root cause analysis and how to effectively determine the underlying vulnerabilities in exploited systems. Presented by Maddie Stone, this talk offers valuable knowledge for security researchers and professionals looking to enhance their skills in vulnerability identification and analysis.
Syllabus
Reversing the Root: Identifying the Exploited Vulnerability in 0-days Used In-The-Wild
Taught by
Black Hat