Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference.

ERESI Team: Next generation debuggers for reverse engineering


Listen Later

"Classical debuggers make use of an interface provided by the
operating system in order taccess the memory of programs while they execute. As this model is dominating in the industry and the community, we show that our novel embedded architecture is more adapted when debuggee systems are hostile and protected at the operating system level.
This alternative modelization is alsmore performant as the debugger executes from inside the debuggee program and can read the memory of the host process directly. We give detailed information about how tkeep memory unintrusiveness using a new technique called allocation proxying.
We reveal how we developed the organization of our multi-
architecture framework and its multiple modules sthat they allow for graph-based binary code analysis, compositional Fingerprinting, program instrumentation, real-time tracing, multithread debugging and general hooking of systems. Finally we reveal the re?ective essence of our framework : our analyzers are made aware of their own internal structures using concepts of aspect oriented programming, embedded in a weakly
typed language dedicated treverse engineering. "
...more
View all episodesView all episodes
Download on the App Store

Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference.By Jeff Moss