Star 0

Abstract

In this presentation, will first show how to use reverse engineering tools to uncover the details of existing vulnerabilities. Second will show how to use debuggers to successfully create the corresponding exploit. Lastly, will show how this technique may be used to discover new vulnerabilities. Specific example, such as Oracle CPU will be used to demonstrate the technique.