ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

Black Hat USA 2025 | How Tree-of-AST Redefines the Boundaries of Dataflow Analysis

Автор: Black Hat

Загружено: 2026-03-09

Просмотров: 394

Описание: In recent years, vulnerability discovery has largely relied on static analysis tools with predefined pattern matching and taint analysis. These traditional methods are not as efficient for complex codebases that span multiple files and utilize atypical input processing techniques. While successful for common vulnerability patterns, they frequently miss sophisticated attack vectors that operate across multiple functions, and sometimes multiple files.

In this talk, we will be covering Tree-of-AST, a new framework that combines large language models with abstract syntax tree analysis to address the limitations above. This approach leverages a unique Locate-Trace-Vote (LTV) methodology that enables autonomous tracking of data flows within large-scale projects, even in the absence of predefined source patterns. We will be sharing conclusive benchmark analysis showing that the Tree-of-AST method outperforms established tools by discovering previously undetected vulnerabilities. The study was done on widely-used open-source projects.

Further, we demonstrate that our system autonomously generates working exploits with a success rate above the industry average for similar tools. We would wrap up the talk by examining practical defensive strategies developers could implement to protect their codebases from similar emerging techniques, and discuss how automatic exploitation capabilities reshape the modern digital security landscape.

By:
Sasha Zyuzin | Student, Bachelor's Degree, University of Maryland
Ruikai Peng | Founder, Pwno

Presentation Materials Available at:
https://blackhat.com/us-25/briefings/...

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
Black Hat USA 2025 | How Tree-of-AST Redefines the Boundaries of Dataflow Analysis

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

Black Hat USA 2025 | Watching the Watchers: Exploring and Testing Defenses of Anti-Cheat Systems

Black Hat USA 2025 | Watching the Watchers: Exploring and Testing Defenses of Anti-Cheat Systems

Black Hat USA 2025 | Uncovering 'NASty' 5G Baseband Vulnerabilities through Dependency-Aware Fuzzing

Black Hat USA 2025 | Uncovering 'NASty' 5G Baseband Vulnerabilities through Dependency-Aware Fuzzing

Arquitectura de sistemas con IA: cómo diseñar aplicaciones con foundation models | Len Bass |LAD2025

Arquitectura de sistemas con IA: cómo diseñar aplicaciones con foundation models | Len Bass |LAD2025

Black Hat USA 2025 | Training Specialist Models: Automating Malware Development

Black Hat USA 2025 | Training Specialist Models: Automating Malware Development

Black Hat USA 2025 | Reinventing Agentic AI Security With Architectural Controls

Black Hat USA 2025 | Reinventing Agentic AI Security With Architectural Controls

Black Hat USA 2025 | Wormable Zero-Click RCE in AirPlay Impacts Billions of Apple and IoT Devices

Black Hat USA 2025 | Wormable Zero-Click RCE in AirPlay Impacts Billions of Apple and IoT Devices

Чистая архитектура и Domain Driven Design на практике | Евгений Лукьянов №77

Чистая архитектура и Domain Driven Design на практике | Евгений Лукьянов №77

Mirra Andreeva vs. Katerina Siniakova | 2026 Indian Wells Round 3 | WTA Match Highlights

Mirra Andreeva vs. Katerina Siniakova | 2026 Indian Wells Round 3 | WTA Match Highlights

Дороничев: ИИ — пузырь, который скоро ЛОПНЕТ. Какие перемены ждут мир?

Дороничев: ИИ — пузырь, который скоро ЛОПНЕТ. Какие перемены ждут мир?

Black Hat USA 2025 | Advanced Bypass Techniques and a Novel Detection Approach

Black Hat USA 2025 | Advanced Bypass Techniques and a Novel Detection Approach

Фильм Алексея Семихатова «ГРАВИТАЦИЯ»

Фильм Алексея Семихатова «ГРАВИТАЦИЯ»

gRPC на Go: от внутреннего устройства до архитектуры

gRPC на Go: от внутреннего устройства до архитектуры

Black Hat USA 2025 | Uncovering Threats and Exposing Vulnerabilities in Next-Gen Cellular RAN

Black Hat USA 2025 | Uncovering Threats and Exposing Vulnerabilities in Next-Gen Cellular RAN

⚡️

⚡️"ЦАРЯ УБЕРЕМ - И ЗАЖИВЁМ!" СТРАШНЫЕ ИНСАЙДЫ ИЗ МИНОБОРОНЫ! Максим Климов

КАК УСТРОЕН TCP/IP?

КАК УСТРОЕН TCP/IP?

Black Hat USA 2025 | Death by Noise: Abusing Alert Fatigue to Bypass the SOC (EDR Edition)

Black Hat USA 2025 | Death by Noise: Abusing Alert Fatigue to Bypass the SOC (EDR Edition)

GPT 5.4 — ИИ Достиг Уровня Человека? ИИ НОВОСТИ

GPT 5.4 — ИИ Достиг Уровня Человека? ИИ НОВОСТИ

Black Hat USA 2025 | Use and Abuse of Palo Alto's Remote Access Solution

Black Hat USA 2025 | Use and Abuse of Palo Alto's Remote Access Solution

Secure Server Core 🔒 Deep Focus Coding Music

Secure Server Core 🔒 Deep Focus Coding Music

Black Hat USA 2025 | Let LLM Learn: When Your Static Analyzer Actually 'Gets It'

Black Hat USA 2025 | Let LLM Learn: When Your Static Analyzer Actually 'Gets It'

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]