Fast Track
If You Find One, There are Probably More! A Detection Method of “Reproduced” Vulnerability
Author: Asuka Nakajima
In a software development process, it is common to reuse source code from other software products to reduce development costs. However, if a vulnerability lurks in the original source code, it will be copied to the developing product. The speaker propose an uncommon method to detect “reproduced” vulnerabilities in binary files, without going through the source code or symbol files.
- Language
- English
- Info
- Presentation
Asuka Nakajima is a researcher at NTT Secure Platform Laboratories. She studied at the Faculty of Environment and Information Studies at Keio University. Her research interests include reverse engineering and vulnerability discovery. She is a member of the executive committee of SECCON, the largest CTF organizer in Japan. She is also a founder of CTF for GIRLS, the first security community for woman in Japan.
