Blog
 

Writing real Pointer Analysis algorithm for LLVM. Part 1: Introduction or a first date with program analysis universe

30.08.2017
Writing real Pointer Analysis algorithm for LLVM. Part 1: Introduction or a first date with program analysis universe

This post introduces a short series on my pointer analysis posts. Pointer analysis algorithms are used to identify, with a given accuracy, those memory areas which variables or expressions may point to. Without information about pointers, it is almost impossible to analyze pointer-intensive programs (i.e. those written in any modern language, such as C, C++, C#, Java, Python, etc.).

The Art of Decompilation: Yesterday, Today, and Tomorrow

07.08.2017
The Art of Decompilation: Yesterday, Today, and Tomorrow

Some time ago, we looked at turning black to white and how decompilation would be used in industrial systems, with our analysis involving discussion of two practical aspects: legacy system algorithm reconstruction and backdoor detection.

How to turn black to white?

03.08.2017
How to turn black to white?

System source code unavailability has affected many enterprises, especially oil and gas and energy companies that actively use SCADA systems in their production processes. However, the losses suffered by such companies if an attack hits the target are inducing banks, insurers, retailers and other businesses to go proactive.

Solared Cyber Security reports on critical vulnerabilities in mobile banking apps

10.07.2017
Solared Cyber Security reports on critical vulnerabilities in mobile banking apps

Solared Cyber Security has unveiled its analytical report on vulnerabilities in mobile banking apps running under iOS, Android, and Windows Phone. The company has announced that 98% of examined apps contained vulnerabilities, over 40% of which were critical.


News 1 - 4 of 7
First | Prev. | 1 2 | Next | Last
Buy a Solared APPscreener
.