{"guid":"import-68c94579cb323fe39d","title":"Automated Exploit Detection in Binaries","subtitle":"Finding exploitable vulnerabilities in binaries","slug":"23C3-1694-en-automated_exploit_detection_in_binaries","link":"http://events.ccc.de/congress/2006/Fahrplan/events/1694.en.html","description":"In this talk, we will introduce the audience to the concepts\ninvolved in static analysis, and different implementations of those concepts\nwith advantages and disadvantages of each. We will show how the open source\ntool bugreport (http://bugreport.sf.net) implements these concepts and will\ndemonstrate the tool finding exploitable bugs in real-world binaries.\n","original_language":"eng","persons":["Luis Miras"],"tags":["23c3"," Hacking"],"view_count":105,"promoted":false,"date":"2006-12-29T01:00:00.000+01:00","release_date":"2008-01-01T01:00:00.000+01:00","updated_at":"2025-05-31T15:15:03.810+02:00","length":2810,"duration":2810,"thumb_url":"https://static.media.ccc.de/media/congress/2006/23C3-1694-en-automated_exploit_detection_in_binaries.jpg","poster_url":"https://static.media.ccc.de/media/congress/2006/23C3-1694-en-automated_exploit_detection_in_binaries_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2006/import-68c94579cb323fe39d-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2006/import-68c94579cb323fe39d-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/23C3-1694-en-automated_exploit_detection_in_binaries","url":"https://api.media.ccc.de/public/events/import-68c94579cb323fe39d","conference_title":"23C3: Who can you trust?","conference_url":"https://api.media.ccc.de/public/conferences/23c3","related":[{"event_id":915,"event_guid":"import-f71a9e4a4b47e42bd3","weight":1},{"event_id":975,"event_guid":"import-16196d0642260192ac","weight":1},{"event_id":1057,"event_guid":"import-d93f6f776ff5e0bf3d","weight":3},{"event_id":1078,"event_guid":"import-d6e0964fb93469b332","weight":1},{"event_id":1080,"event_guid":"import-ed88ca5ebf2520ebf0","weight":1},{"event_id":1140,"event_guid":"import-b30b82b19634b974d9","weight":1},{"event_id":1141,"event_guid":"import-c9f7320f170642feee","weight":1},{"event_id":1142,"event_guid":"import-811a4a998765dd6d06","weight":2},{"event_id":1187,"event_guid":"import-f50e40b051718848b9","weight":1},{"event_id":1241,"event_guid":"import-747eff9b437e649884","weight":1},{"event_id":1247,"event_guid":"import-91e5b00343840237ef","weight":1},{"event_id":1254,"event_guid":"import-2a8d0099b181354d29","weight":1},{"event_id":2827,"event_guid":"f79c744f-30d1-4175-a173-2e760049337d","weight":1},{"event_id":4945,"event_guid":"540aaf40-03b5-11e8-8b91-e7b5e3e254af","weight":1}],"recordings":[{"size":204,"length":2810,"mime_type":"audio/mpeg","language":"eng","filename":"23C3-1694-en-automated_exploit_detection_in_binaries.mp3","state":"downloaded","folder":"audio","high_quality":true,"width":640,"height":480,"updated_at":"2014-05-10T15:26:39.377+02:00","recording_url":"https://cdn.media.ccc.de/congress/2006/audio/23C3-1694-en-automated_exploit_detection_in_binaries.mp3","url":"https://api.media.ccc.de/public/recordings/1845","event_url":"https://api.media.ccc.de/public/events/import-68c94579cb323fe39d","conference_url":"https://api.media.ccc.de/public/conferences/23c3"},{"size":204,"length":2810,"mime_type":"video/mp4","language":"eng","filename":"23C3-1694-en-automated_exploit_detection_in_binaries.m4v","state":"downloaded","folder":"video","high_quality":true,"width":640,"height":480,"updated_at":"2016-01-27T11:03:21.172+01:00","recording_url":"https://cdn.media.ccc.de/congress/2006/video/23C3-1694-en-automated_exploit_detection_in_binaries.m4v","url":"https://api.media.ccc.de/public/recordings/1844","event_url":"https://api.media.ccc.de/public/events/import-68c94579cb323fe39d","conference_url":"https://api.media.ccc.de/public/conferences/23c3"}]}