- Популярные видео
- Авто
- Видео-блоги
- ДТП, аварии
- Для маленьких
- Еда, напитки
- Животные
- Закон и право
- Знаменитости
- Игры
- Искусство
- Комедии
- Красота, мода
- Кулинария, рецепты
- Люди
- Мото
- Музыка
- Мультфильмы
- Наука, технологии
- Новости
- Образование
- Политика
- Праздники
- Приколы
- Природа
- Происшествия
- Путешествия
- Развлечения
- Ржач
- Семья
- Сериалы
- Спорт
- Стиль жизни
- ТВ передачи
- Танцы
- Технологии
- Товары
- Ужасы
- Фильмы
- Шоу-бизнес
- Юмор
GreHack 2020: Reverse Engineering archeology - Shlomi Oberman, Moshe Kol and Ariel Schön
Ripple20 is a series of zero-day vulnerabilities discovered in a widely used low-level TCP/IP software library developed by Treck, Inc and disclosed by JSOF in June 2020. This session focuses on the original research process used to identify and pinpoint the Ripple20 vulnerabilities, their variants, and some attempts to piece together the historical timeline showing how the original software library changed over time. This was a complex process of reverse engineering multiple devices simultaneously, working in parallel on many different levels. In this session we will describe how we reverse engineered the devices simultaneously, using comparative techniques to confirm each point. We will explain an interesting outcome of the supply chain ripple effect, and how it is now possible to find a vulnerability affecting hundreds of devices for near zero effort.
https://grehack.fr/2020/program
Видео GreHack 2020: Reverse Engineering archeology - Shlomi Oberman, Moshe Kol and Ariel Schön канала GreHack
https://grehack.fr/2020/program
Видео GreHack 2020: Reverse Engineering archeology - Shlomi Oberman, Moshe Kol and Ariel Schön канала GreHack
Комментарии отсутствуют
Информация о видео
22 ноября 2020 г. 13:52:23
00:40:48
Другие видео канала

![[GreHack 2017] Rump -- Overengineered making-of](https://i.ytimg.com/vi/IIulM0iH66w/default.jpg)
![[GreHack 2016] [Rump] Fuzzing – Nicolas Ruff](https://i.ytimg.com/vi/R5SF9noMNsc/default.jpg)
![[GreHack 2017] Code Protection: Promises and Limits of Symbolic Deobfuscation](https://i.ytimg.com/vi/KesTFLNHaew/default.jpg)





![[GreHack 2016] Protecting Data on Smartphones & Tablets using Trusted Computing – Stefan Saroiu](https://i.ytimg.com/vi/3PiqKqIJegY/default.jpg)



![[GreHack 2017] Efficient Defenses against Adversarial Examples for Deep Neural Networks](https://i.ytimg.com/vi/sh6OS6Lssv4/default.jpg)

![[GreHack 2016] BtleJuice: the Bluetooth Smart Man In The Middle Framework – Damien Cauquil](https://i.ytimg.com/vi/KHkRsYnAWYo/default.jpg)

![[Grehack 2015] Industrial Control Systems Dynamic Code Injection](https://i.ytimg.com/vi/HPikAOx-Aik/default.jpg)
![GreHack 2022: Online Voting System [...] Must Be Secure, Right? by Emmanuel Leblond](https://i.ytimg.com/vi/wTGM4lskycM/default.jpg)
![[2015] Grehack CTF - Teaser](https://i.ytimg.com/vi/OrmY8JR3dn8/default.jpg)
