A demonstration of the Zorya framework, an automated tool designed for the discovery of concurrency vulnerabilities and complex logic state flaws in compiled binaries. The talk covers the integration of symbolic execution engines to scale deep security analysis across modern enterprise software stacks.
CONFERENCE PAGE ➔This talk provides an intensive technical guide for penetration testers on identifying and exploiting security weaknesses in GraphQL APIs. It covers advanced query manipulation, schema introspection bypasses, and authorization flaws inherent in complex graph-based data architectures, offering practical insights into securing these modern API endpoints.
This talk provides a deep dive into embedded system security, specifically focusing on the U-Boot bootloader. Keith demonstrates firmware extraction techniques, reverse engineering methodology, and the exploitation of hardware-bound software components.
An introduction to the mechanics of symbolic execution and its practical application in vulnerability research. Keith discusses how to bridge the gap between theoretical computer science and real-world exploit development through automated path exploration.
WATCH TALK ON YOUTUBE ➔ CONFERENCE PAGE ➔Exploring complex logic vulnerabilities that exist beyond simple buffer overflows. This session focuses on identifying state-machine flaws and concurrency issues in compiled applications using custom instrumentation and advanced binary analysis techniques.
Symbolic execution is a powerful program analysis technique that treats program inputs as symbols rather than concrete values. This allows for the exploration of multiple execution paths simultaneously, making it highly effective for finding bugs and vulnerabilities. However, symbolic execution can be computationally expensive and often struggles with path explosion. This talk will explore techniques to control and guide symbolic execution using the Angr framework, a powerful Python-based binary analysis platform. We will cover methods for state pruning, constraint manipulation, and custom simulation managers to improve the efficiency and effectiveness of symbolic execution in real-world security applications.