queryx: symbolic query on decompiled code for finding bugs in cots binaries
Published 1 year ago • 306 plays • Length 13:14Download video MP4
Download video MP3
Similar videos
-
21:37
unleashing mayhem on binary code
-
11:57
usenix security '20 - sys: a static/symbolic tool for finding good bugs in good (browser) code
-
21:07
norax: enabling execute-only memory for cots binaries on aarch64
-
22:47
cross-architecture bug search in binary executables
-
6:11
exploiting server-side parameter pollution in a query string | portswigger academy tutorial
-
11:26
exploiting server-side parameter pollution in a query string
-
3:57
check point harmony endpoint - full disk encryption (fde)
-
11:58
usenix security '21 - finding bugs using your own code: detecting functionally-similar yet
-
19:44
find vulnerabilities in your code with snyk
-
20:31
usenix security '19 - detecting missing-check bugs via semantic- and context-aware
-
38:37
find bugs in your code with codeql
-
1:05
grebe: unveiling exploitation potential for linux kernel bugs
-
13:31
difuzzrtl: differential fuzz testing to find cpu bugs
-
1:02
difuzzrtl: differential fuzz testing to find cpu bugs
-
12:52
usenix security '23 - security analysis of mongodb queryable encryption
-
30:15
usenix security '15 - under-constrained symbolic execution: correctness checking for real code
-
17:54
grebe: unveiling exploitation potential for linux kernel bugs
-
56:33
finding logic bugs in database management systems (manuel rigger, eth sqlancer)
-
37:45
tensorflow london: yi wei 'find bugs in the herd with debuggable tensorflow code'
-
1:53
embedding invisible codes