Ringzer0 BOOTSTRAP24 Austin

Robin David

Robin David, Phd is the automated analysis team leader at Quarkslab and full-time software security researcher. He is working on various technologies like greybox fuzzing, symbolic excution, firmware analysis and deobfuscation for which he is actively working on open-source tools to help to community.
He has been presenting his work in a variety of industrial conferences like Black Hat or BalCCon but also academic venues like S\&P, BAR, or ISSTA. He is also trainer at RingZero.


What is your Twitter/X Handle?

@RobinDavid1

What is your Linked In URL?

https://www.linkedin.com/in/robin-david-17304685/


Session

02-24
13:30
90min
Binary Reversing and Whole Firmware Diffing
Robin David

Diffing is used in reverse-engineer, to analyze two variants or versions of a same software whether its a legit executable or a malware. It is useful to transfer information from a program to another, for anti-plagiarism or for patch analysis and thus vulnerability research. While multiple diffing tools exists little has been done to perform it at scale on numerous binaries.

This workshop introduces a variety of tools to both analyze binaries by working on their representation extracted from a disassembler and also tools to automate diffing with Bindiff. All these tools have been open-sourced very recently and documentation is available at https://diffing.quarkslab.com.

Workshop Track 2 📍Room 1.126