Assembly:Binary Security

From 34C3_Wiki
Jump to: navigation, search
Website
Contact phrazer (Twitter: @mr_phrazer)
Description We are an open assembly for everyone interested in aspects of binary software security. We discuss and work on projects such as reverse engineering, fuzzing, CPU microcode updates, deobfuscation, exploitation, ...
Members
Projects create project
Self-organized Sessions create self-organized session
Related to Assembly Assembly:Offensive AI, Assembly:Deepcyber, Assembly:Schinfo
Tags binary, security, reverse engineering, fuzzing, exploitation, microcode
Registered on
Provides stage no
Location for self-organized sessions maybe
Self-organized session notes - reverse engineering of CPU microcode

- fuzzing - SMT solving and formal program analysis

Orga contact mr.phrazer@gmail.com
Brings - a hand full desktop computers
Projects - kernel fuzzing and bug hunting (https://github.com/RUB-SysSec/kAFL)

- software reverse engineering and exploitation - probabilistic program analysis - microcode reverse engineering (https://github.com/RUB-SysSec/Microcode)

Uses money no money handling
Need fibre no
Extra Power {{{Extra power}}}
Near passage whatever
Character of assembly place to show and meet
Seats needed 22
Extra seats 7
Aread needed 30
Arrival and build up 26th of December, day 0

refresh

We are an open assembly for everything related to binary software security. We are interested in

- reverse engineering and exploitation - code obfuscation/deobfuscation - fuzzing and bug hunting - CPU reverse engineering and microcode - formal methods and machine learning based program analysis - ...

If you love these topics, join us and let us hack together (or drink a beer).