Learn, hack!

Hacking and security documentation: slides, papers, video and audio recordings. All in high-quality, daily updated, avoiding security crap documents. Spreading hacking knowledge, for free, enjoy. Follow on .

Crash Analysis using BitBlaze

Type
Paper
Tags
fuzzing, reverse engineering
Authors
Charlie Miller, Noah Johnson
Event
Black Hat USA 2010
Indexed on
Mar 27, 2013
URL
https://media.blackhat.com/bh-us-10/whitepapers/Miller/BlackHat-USA-2010-CMiller-Bitblaze-wp.pdf
File name
BlackHat-USA-2010-CMiller-Bitblaze-wp.pdf
File size
1.4 MB
MD5
cad0f6477310c7ba45791e8cc6962094
SHA1
4ed2f88256cca8caad2fd5ad5b49441da77de15e

You’ve fuzzed your favorite application and found a mountain of crashes, now what? BitBlaze is an open source binary analysis platform which can perform whole system taint tracing, dynamic symbolic execution, as well as static analysis. Using BitBlaze, it is possible to determine, upon application crash, which registers and memory locations are tainted from the fuzzed input and in what ways they are used. Furthermore, this taint information can give a level of understanding on what went wrong with the program and why, reducing crash analysis from days to hours and sometimes minutes. In this talk, we present BitBlaze as well as walk through real life case studies of its use.

About us

Secdocs is a project aimed to index high-quality IT security and hacking documents. These are fetched from multiple data sources: events, conferences and generally from interwebs.

Statistics

Serving 8166 documents and 531.0 GB of hacking knowledge, indexed from 2419 authors from 163 security conferences.

Contribute

To support this site and keep it alive, you can click on the buttons below. Any help is really appreciated! This service is provided for free, but real money is needed to pay bills.

Flattr this Click here to lend your support to: Keep live SecDocs for an year and make a donation at www.pledgie.com !