What if You Could Protect Software Before the Next Zero Day Is Discovered?
Zero-day vulnerabilities are the hidden threat lurking in every software stack. In this THREATCON1 session, Doug Britton explains how organizations can use binary analysis to quantify potential zero-day risk and stop memory safety exploits.
Through the lens of Return-Oriented Programming (ROP) and memory safety, Doug shows how modern attackers chain small fragments of legitimate code to escalate privileges or execute remote commands and how binary-level randomization stops them cold.
Highlights:
- Understand how ROP chains enable zero-day exploits
- Learn how to measure the “attack surface” of compiled binaries
- See why memory safety bugs drive zero-day risk in embedded software
- Learn how fine-grained memory function randomization neutralizes exploitability
Watch the full session to learn more.
Interested in seeing your zero-day exposure? RunSafe offers a Risk Reduction Analysis based on the topic of this talk. Analyze your binary here.
Watch all THREATCON1 content here: https://www.threatcon1.org/registration



