Binary Vulnerability Examples

Conclusion

Many of the vulnerabilities discovered in closed source products are those that were weeded out of open source software years ago. Because of some of the challenges inherent to binary auditing, most of this software is under- audited or only fuzz- tested , and many vulnerabilities still lurk unnoticed. While there is a bit of overhead work involved in binary auditing, it is not much more difficult than source-code auditing and simply requires a little more time. As time passes , many of the more obvious vulnerabilities will be fuzz-tested out of commercial software, and to find more subtle bugs , an auditor will have to do more in-depth binary analysis. Binary auditing may eventually become as commonplace as source code review ”it is definitely a field in which much work still needs to be done.



The Shellcoder's Handbook. Discovering and Exploiting Security
Hacking Ubuntu: Serious Hacks Mods and Customizations (ExtremeTech)
ISBN: N/A
EAN: 2147483647
Year: 2003
Pages: 198
Authors: Neal Krawetz

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net