Vulnerability analysis, practical data flow analysis and visualization

Recently at CanSecWest 2012, we presented on the technology we use for analyzing malicious samples and PoC files. As malware often actively attempts to exploit software vulnerabilities these days, understanding the internals of these vulnerabilities is essential when writing defense logic. Out of the many methods that can be used for vulnerability analysis, we presented…

0