首页
社区
课程
招聘
[转帖]Detecting Use-After-Free vulnerabilities using REVEN
发表于: 2021-1-19 16:53 1999

[转帖]Detecting Use-After-Free vulnerabilities using REVEN

2021-1-19 16:53
1999

Detecting Use-After-Free vulnerabilities using REVEN

Tetrane’s Timeless Debugging and Analysis (TDnA) allows to capture a time slice of the execution of a system (CPU, Memory, Hardware Events) and provides some powerful analysis features that speed up and scale the reverse engineering process. It can be combined with various fuzzing approaches that will drive the discovery of relevant scenarios. The main benefit of TDnA is to observe the system once, then to be able to analyze it in stable conditions and in as many directions as desired with high-level algorithms such as backward/forward data tainting. In this article, we present some approaches to tackle the UAF detection problem with Tetrane’s REVEN TDnA platform which is a commercially available solution. The result is an operational Jupyter notebook that was field tested with REVEN against some actual vulnerabilities from the Common Vulnerabilities and Exposures (CVE) list, among which BlueKeep (CVE- 2019-0708). More generally, our implementation can report UAF vulnerabilities whether they trigger a crash or not, in both user and kernel space. We present an analysis of our results in terms of performance and accuracy and suggest future developments.

https://blog.tetrane.com/2020/vulnerability-detection-use-after-free.html



[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课

收藏
免费 1
支持
分享
最新回复 (2)
雪    币: 2394
活跃值: (8795)
能力值: ( LV2,RANK:15 )
在线值:
发帖
回帖
粉丝
2

网页本地存档

上传的附件:
2021-1-19 17:09
0
雪    币: 98729
活跃值: (201034)
能力值: (RANK:10 )
在线值:
发帖
回帖
粉丝
3
FleTime 网页本地存档
2021-1-19 17:11
0
游客
登录 | 注册 方可回帖
返回
//