BEGIN:VCALENDAR
PRODID;X-RICAL-TZSOURCE=TZINFO:-//com.denhaven2/NONSGML ri_cal gem//EN
CALSCALE:GREGORIAN
VERSION:2.0
BEGIN:VEVENT
DTEND;VALUE=DATE-TIME:20240818T161500Z
DTSTART;VALUE=DATE-TIME:20240818T151500Z
DTSTAMP;VALUE=DATE-TIME:20240718T164150Z
UID:bbb0f923-bd64-4de6-b6e5-6eb0eed63e61@frab.froscon.org
DESCRIPTION:Building a product with an entirely open-source software stac
 k is still challenging at best - sometimes even infeasible. The past has
  shown that vulnerabilities in closed-source components may be exploited
  by attackers to undermine the security of a system. Attackers invest a 
 considerable amount of effort and expertise into reverse-engineering the
 se components to uncover complex vulnerabilities. Manufacturers that rel
 y on closed source components oftentimes have neither the resources not 
 the expertise to perform the same level of auditing. This imbalance lead
 s to security issues in the final product that may directly impact its u
 sers.\n\nThe cwe_checker is an open-source research prototype that perfo
 rms static analysis of binary code to find potential vulnerabilities. It
  currently supports the analysis of Linux user space programs and kernel
  modules as well as bare-metal firmwares. Our goal is to reduce the time
  and expertise needed by vendors to thoroughly audit their closed-source
  dependencies.
URL:https://programm.froscon.org/2024/events/3064.html
SUMMARY:Finding Bugs in Closed-source Software: An Open-source Static Bin
 ary Analysis Tool (written in Rust)
ORGANIZER:froscon2024
LOCATION:froscon2024 - HS7
END:VEVENT
END:VCALENDAR
