Friday, July 9, 2004: 11:00 am (Area "A"): Automated binary analysis techniques have become sufficiently advanced so that having the source to software is no longer a prerequisite for finding security flaws. The binary is equivalent to the source. And a patch is equivalent to a detailed description of a security flaw. This talk will cover the implications of the latest binary analysis technology and give an overview of some of the technology available. Hosted by Dildog and Weld Pond
Welcome! This is the place to go to see some real hacker culture and history. Our first four conferences (HOPE, Beyond HOPE, H2K, and H2K2) can be found in their entirety right here. Please enjoy our efforts to preserve it all and buy a DVD or two if you want a copy of anything for your personal library. We appreciate the support! Visit http://store.2600.com/videos.html to see details on the hundreds of talks from our assorted conferences, all of which will eventually be posted here.