|=------------------------------------------------------------------------------------------------=|

 ########  ######## ########  ######   #######  ##    ##    ########   #######  ##     ## ######## 
 ##     ## ##       ##       ##    ## ##     ## ###   ##    ##     ## ##     ## ###   ### ##       
 ##     ## ##       ##       ##       ##     ## ####  ##    ##     ## ##     ## #### #### ##       
 ##     ## ######   ######   ##       ##     ## ## ## ##    ########  ##     ## ## ### ## ######   
 ##     ## ##       ##       ##       ##     ## ##  ####    ##   ##   ##     ## ##     ## ##       
 ##     ## ##       ##       ##    ## ##     ## ##   ###    ##    ##  ##     ## ##     ## ##       
 ########  ######## ##        ######   #######  ##    ##    ##     ##  #######  ##     ## ######## 
 
|=------------------------------------------------------------------------------------------------=|

                                 DEF CON group 11396 @ Rome, Italy
                                
                               [Main] [Meetings] [Posts] [Projects] 


|=------------------------------------=[ November 2018 (1) ]=-------------------------------------=|

by malweisse
This is the second meeting of the DEF CON group. Date and location: November 2nd from 5 p.m. to 7 p.m. in the B2 room at the Department of Computer, Control, and Management Engineering (DIAG) Antonio Ruberti at Sapienza University of Rome. The schedule is: ---[ RopGun: runtime detection of ROP payload executions, by anticlockwise RopGun is a Linux implementation of a transparent ROP mitigation technique based on runtime detection of abnormal control transfers using hardware performance counters found on commodity processors. The author of the tool will show us how the tool is made and how it works. Slides link: https://docs.google.com/presentation/d/1uoO23Qgu17Qme2EFHDmlScZqEOGvZdd7-FBsTbd65-4/edit?usp=sharing ---[ Angr & Pwn: vulnerability detection using symbolic execution, by malweisse An introduction to the binary framework angr and its usage. The talk will focus on the possibility to found security bugs executing symbolically a software. If you want you can bring your laptop and play with angr during the talk. Slides link: https://docs.google.com/presentation/d/1_64Vm0pw6QpFbBYy8s1RHkDrJHj4zHIc7d8yTrSr1JI/edit?usp=sharing Download talk material: /assets/angr_talk_material.tar.gz.