Security SIG: Reverse Engineering and Computer Security
The Monthly Meeting of the Security SIG
Reverse Engineering and Computer Security
This talk will discuss the application of reverse engineering in the field of computer security. This black art has been used by both hackers and defenders for a long time, but in recent years we've seen significant improvements in the techniques and the results that can be achieved. I will focus on reverse engineering of Microsoft patches, and demonstrate how quickly a patch can be turned into an exploit, even in the absence of public information about the vulnerability. On the flip side, I will also discuss how 0-day vulnerabilities can easily be patched by 3rd parties, even without support from the vendor or access to the source code of the affected application.
About The Presenter
Alexander Sotirov, Vulnerability Researcher, Determina Inc.
Alexander Sotirov has been involved in computer security since 1998. For the past nine years he has been working on reverse engineering, exploit code development and research in automated source code auditing. His most well-known work is the development of highly reliable exploits for Apache/mod_ssl, ProFTPd and Windows ASN.1. He graduated with a Master's degree in computer science in 2005. His current job is as a reverse engineer on the security research team at Determina Inc.
Cubberley Community Center
4000 Middlefield Road, Room H-1
Palo Alto, CA
6:30 - 7:00 p.m. Registration / Networking / Refreshments / Pizza
7:00 - 9:00 p.m. Presentation and Discussion
$15 at the door for non-SDForum members
No charge for SDForum members
No registration required
More on the Security SIG...