filmov
tv
How Automated Vulnerability Analysis Discovered Hundreds of Android 0-days

Показать описание
Giovanni Vigna, CTO, Lastline, Inc.
Death from a million bugs. Android has become one of the world’s most deployed operating systems. Recently researchers have been focused on uncovering vulnerabilities in the Android smartphone ecosystem. This session will present newly developed automated vulnerability analysis techniques that resulted in the discovery of hundreds of previously unknown vulnerabilities.
Learning Objectives:
1: Learn how to use automated vulnerability analysis to ID security bugs at scale.
2: Learn about state-of-the-art and novel techniques for automated vulnerability analysis.
3: Learn proven techniques to find vulnerabilities in bootloaders, kernel drives and apps.
Death from a million bugs. Android has become one of the world’s most deployed operating systems. Recently researchers have been focused on uncovering vulnerabilities in the Android smartphone ecosystem. This session will present newly developed automated vulnerability analysis techniques that resulted in the discovery of hundreds of previously unknown vulnerabilities.
Learning Objectives:
1: Learn how to use automated vulnerability analysis to ID security bugs at scale.
2: Learn about state-of-the-art and novel techniques for automated vulnerability analysis.
3: Learn proven techniques to find vulnerabilities in bootloaders, kernel drives and apps.
How Automated Vulnerability Analysis Discovered Hundreds of Android 0-days
pwn.college Module 12 - Automatic Vulnerability Discovery - Introduction
pwn.college Module 12 - Automated Vulnerability Discovery - Static Analysis
Projecting How AI/ML Will Revolutionize Software Vulnerability Discovery
OTRazor: Static Code Analysis for Vulnerability Discovery in Industrial Automation Scripts
Continuous Risk & Vulnerability Assessment (CORVA)
How can automated code repair help DoD with legacy code vulnerability analysis?
Faster Emulation-based Fuzzing For Automated Software Vulnerability Discovery
Five Reasons Why You Should Consider Automated Vulnerability Scanning
GrammaTech Proteus: Automated Vulnerability Discovery and Remediation
How to Scan ANY Website for Vulnerabilities!
pwn.college Module 12 - Automated Vulnerability Discovery - Fuzzing
Automated Human Vulnerability Scanning With AVA
VULNERABILITY ANALYSIS IN CYBER SECURITY
Effective Vulnerability Discovery with Machine Learning
Complete Full-Stack Vulnerability Scanning In 2025 - CyPro
Vulnerability Analysis Demystified: Expert Insights from Cyber Security Specialist at Bell
Vulnerability Discovery
OTRazor Static Code Analysis for Vulnerability Discovery in Industrial Automation Scripts
SmartSentry: A Framework for Automated Vulnerability Discovery in Ethereum Smart Contracts
Vulnerability Discovery in the Cloud
pwn.college Module 12 - Automated Vulnerability Discovery - Dynamic Symbolic Execution
What is Security Testing ?
Trickest Vulnerability Assessment | Attacker View, Automated
Комментарии