Blog
 

(S)SDLC, or How to Make Development More Secure? Part 1

04.06.2020
(S)SDLC, or How to Make Development More Secure? Part 1
With the development culture continuing to evolve rapidly, new code quality assurance tools are appearing on the market and being used in dramatically new and innovative ways. We’ve already written about static analysis, what to pay attention to when choosing an analyzer, and, finally, how to establish a static analysis-based process for your organization.

Writing real Pointer Analysis algorithm for LLVM. Part 1: Introduction or a first date with program analysis universe

30.08.2017
Writing real Pointer Analysis algorithm for LLVM. Part 1: Introduction or a first date with program analysis universe

This post introduces a short series on my pointer analysis posts. Pointer analysis algorithms are used to identify, with a given accuracy, those memory areas which variables or expressions may point to. Without information about pointers, it is almost impossible to analyze pointer-intensive programs (i.e. those written in any modern language, such as C, C++, C#, Java, Python, etc.).

The Art of Decompilation: Yesterday, Today, and Tomorrow

07.08.2017
The Art of Decompilation: Yesterday, Today, and Tomorrow

Some time ago, we looked at turning black to white and how decompilation would be used in industrial systems, with our analysis involving discussion of two practical aspects: legacy system algorithm reconstruction and backdoor detection.

How to turn black to white?

03.08.2017
How to turn black to white?

System source code unavailability has affected many enterprises, especially oil and gas and energy companies that actively use SCADA systems in their production processes. However, the losses suffered by such companies if an attack hits the target are inducing banks, insurers, retailers and other businesses to go proactive.


News 1 - 4 of 8
First | Prev. | 1 2 | Next | Last
Buy a Solar appScreener
.