BINSEC Team @ Université Paris-Saclay, CEA, List (@binsectool) 's Twitter Profile
BINSEC Team @ Université Paris-Saclay, CEA, List

@binsectool

Binary code analysis for security / Academic research (Infosec, SE, FM, AI) / Open-source tool / Applied in industry / Posts by @michaelmarcozzi and @Seb_Bardin

ID: 1308475666506149888

linkhttps://binsec.github.io calendar_today22-09-2020 18:38:20

632 Tweet

908 Takipçi

359 Takip Edilen

BINSEC Team @ Université Paris-Saclay, CEA, List (@binsectool) 's Twitter Profile Photo

How to detect backdoors efficiently? ▶️ Backdoors were found in firmware & open-source code ▶️ Detection requires much manual reverse-engineering ▶️ Fuzzers cannot see backdoors Our ICSE preprint on finding backdoors with fuzzing is at binsec.github.io/nutshells/icse… A thread ⬇️

How to detect backdoors efficiently?

▶️ Backdoors were found in firmware & open-source code
▶️ Detection requires much manual reverse-engineering 
▶️ Fuzzers cannot see backdoors

Our <a href="/ICSEconf/">ICSE</a> preprint on finding backdoors with fuzzing is at binsec.github.io/nutshells/icse…

A thread ⬇️