Using Binary Analysis to Quantify Potential Zero-Day Risk with Doug Britton

At THREATCON1, RunSafe Security’s Doug Britton spoke on analyzing ROP chains in embedded software to quantify potential zero-day risk and how to take action to neutralize memory vulns.

Using Binary Analysis to Quantify Potential Zero-Day Risk

What if You Could Protect Software Before the Next Zero Day Is Discovered?

Zero-day vulnerabilities are the hidden threat lurking in every software stack. In this THREATCON1 session, Doug Britton explains how organizations can use binary analysis to quantify potential zero-day risk and stop memory safety exploits.

Through the lens of Return-Oriented Programming (ROP) and memory safety, Doug shows how modern attackers chain small fragments of legitimate code to escalate privileges or execute remote commands and how binary-level randomization stops them cold.

Highlights:

  • Understand how ROP chains enable zero-day exploits
  • Learn how to measure the “attack surface” of compiled binaries
  • See why memory safety bugs drive zero-day risk in embedded software
  • Learn how fine-grained memory function randomization neutralizes exploitability

Watch the full session to learn more.

Interested in seeing your zero-day exposure? RunSafe offers a Risk Reduction Analysis based on the topic of this talk. Analyze your binary here.

Watch all THREATCON1 content here: https://www.threatcon1.org/registration

How RunSafe Protects VxWorks Systems from URGENT/11 Exploits

How RunSafe Protects VxWorks Systems from URGENT/11 Exploits

Stopping URGENT/11 Attacks with RunSafe Protect In this demo, we show how RunSafe Protect defends VxWorks-based embedded systems from URGENT/11 memory safety exploits. You’ll see a vulnerable system challenged by a simulated attack and then observe how RunSafe’s...

read more
RunSafe Security in 2 Minutes: Protecting Critical Software

RunSafe Security in 2 Minutes: Protecting Critical Software

Inside RunSafe: A Quick Look at Our Mission, Platform, and Impact RunSafe Security is dedicated to protecting the world’s most critical software across defense, infrastructure, automotive, and medical systems. In this video, you’ll see how our platform delivers a...

read more