Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Introduction to Procedural Debugging through Binary Libification

USENIX via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn about innovative techniques for debugging memory corruption vulnerabilities in a 16-minute conference talk from WOOT '24. Explore the concepts of "libification" and "procedural debugging" that enable transformation of dynamically linked ELF binaries into shared libraries. Discover how to analyze memory corruption bugs by directly accessing vulnerable functions, effectively separating intraprocedural analysis from reachability problems. Gain insights into an open-source framework designed to implement libification, making these debugging techniques more accessible to the security community. Presented by Jonathan Brossard from the Conservatoire National des Arts et Métiers in Paris, this talk offers practical solutions for assessing and analyzing potential vulnerabilities in compiled software without the need to write complete exploits.

Syllabus

WOOT '24 - Introduction to Procedural Debugging through Binary Libification

Taught by

USENIX

Reviews

Start your review of Introduction to Procedural Debugging through Binary Libification

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.