Using Binary Analysis to Quantify Potential Zero-Day Risk with Doug Britton

At THREATCON1, RunSafe Security’s Doug Britton spoke on analyzing ROP chains in embedded software to quantify potential zero-day risk and how to take action to neutralize memory vulns.

Using Binary Analysis to Quantify Potential Zero-Day Risk

What if You Could Protect Software Before the Next Zero Day Is Discovered?

Zero-day vulnerabilities are the hidden threat lurking in every software stack. In this THREATCON1 session, Doug Britton explains how organizations can use binary analysis to quantify potential zero-day risk and stop memory safety exploits.

Through the lens of Return-Oriented Programming (ROP) and memory safety, Doug shows how modern attackers chain small fragments of legitimate code to escalate privileges or execute remote commands and how binary-level randomization stops them cold.

Highlights:

  • Understand how ROP chains enable zero-day exploits
  • Learn how to measure the “attack surface” of compiled binaries
  • See why memory safety bugs drive zero-day risk in embedded software
  • Learn how fine-grained memory function randomization neutralizes exploitability

Watch the full session to learn more.

Interested in seeing your zero-day exposure? RunSafe offers a Risk Reduction Analysis based on the topic of this talk. Analyze your binary here.

Watch all THREATCON1 content here: https://www.threatcon1.org/registration