Technical Presentations

BLACK HAT ASIA ARSENAL // APRIL 2024

Zorya: Go Binary Vulnerability Detection with Concolic Execution

A demonstration of the Zorya framework, an automated tool designed for the discovery of concurrency vulnerabilities and complex logic state flaws in compiled binaries. The talk covers the integration of symbolic execution engines to scale deep security analysis across modern enterprise software stacks.

CONFERENCE PAGE ➔
BSIDES CAPE TOWN // DECEMBER 2024

Attacking GraphQL: A Guide for Penetration Testers

This talk provides an intensive technical guide for penetration testers on identifying and exploiting security weaknesses in GraphQL APIs. It covers advanced query manipulation, schema introspection bypasses, and authorization flaws inherent in complex graph-based data architectures, offering practical insights into securing these modern API endpoints.

CONFERENCE PAGE ➔
BSIDES CAPE TOWN // DECEMBER 2023

How to Sink a U-Boot: Understanding Bootloader Attack Surface

This talk provides a deep dive into embedded system security, specifically focusing on the U-Boot bootloader. Keith demonstrates firmware extraction techniques, reverse engineering methodology, and the exploitation of hardware-bound software components.

CONFERENCE PAGE ➔
ICASA SOUTH AFRICA CHAPTER / CAPETOWN // SEPTEMBER 2020

Symbolic Execution and its Security Application

An introduction to the mechanics of symbolic execution and its practical application in vulnerability research. Keith discusses how to bridge the gap between theoretical computer science and real-world exploit development through automated path exploration.

WATCH TALK ON YOUTUBE ➔ CONFERENCE PAGE ➔
0XCOFFEE MEETUP // APRIL 2023

Beyond String Theory: Symbolically enhanced reverse engineering

Exploring complex logic vulnerabilities that exist beyond simple buffer overflows. This session focuses on identifying state-machine flaws and concurrency issues in compiled applications using custom instrumentation and advanced binary analysis techniques.

PYCON ZA // SEPTEMBER 2020

Controlling your angr: Techniques for improving symbolic execution with the Angr Framework

Symbolic execution is a powerful program analysis technique that treats program inputs as symbols rather than concrete values. This allows for the exploration of multiple execution paths simultaneously, making it highly effective for finding bugs and vulnerabilities. However, symbolic execution can be computationally expensive and often struggles with path explosion. This talk will explore techniques to control and guide symbolic execution using the Angr framework, a powerful Python-based binary analysis platform. We will cover methods for state pruning, constraint manipulation, and custom simulation managers to improve the efficiency and effectiveness of symbolic execution in real-world security applications.

CONFERENCE PAGE ➔