Fuzzing 101 followed by a talk on the difficulties of closed-source embedded code fuzzing and possible solutions. Finally, a crash course on how to use Qiling alongside AFL++, so your fuzzing campaigns can finally be taken “off the shelf”
SPEAKERS
Nikita Proshin
Security Analyst, Assume Birch Team
A graduate of BMSTU with a major in Information Security.
After a couple of years in malware analysis, Nikita became keen on smart device hardware and firmware security assessment: from communicating with radio interfaces to glitch injection attacks
We use cookies to personalize our services and enhance your browsing experience. You can disable cookies in your browser settings. Read our cookie policy to learn more about how we use cookies