BEGIN:VCALENDAR
PRODID:-//vBulletin 6//EN
VERSION:2.0
CALSCALE:GREGORIAN
BEGIN:VEVENT
UID:b2db9c81-e7f8-4d45-9ca8-d83ad17f3b42
DTSTAMP:20260519T131119Z
SUMMARY:Glyph - Corey Hartman
DESCRIPTION:Glyph\n\nFriday August 11\, 14:00 – 15:55\, Society Boardroom
 \, Forum\n\nCorey Hartman\n\nReverse engineering is an important task perf
 ormed by security researchers to identify vulnerable functions and malicio
 us functions in IoT (Internet of Things) devices that are often shared acr
 oss multiple devices of many system architectures. Common techniques to cu
 rrently identify the reuse of these functions do not perform cross-archite
 cture identification unless specific data such as unique strings are ident
 ified that may be of use in identifying a piece of code. Utilizing natural
  language processing techniques\, Glyph allows you to upload an ELF binary
  (32 & 64 bit) for cross-architecture function fingerprinting\, upon analy
 sis\, a web-based function symbol table will be created and presented to t
 he user to aid in their analysis of binary executables/shared objects.\n\n
 Corey Hartman served 6 years active duty in the United States Air Force\, 
 later obtaining a Bachelor of Science degree in Software Development\, and
  a Master of Science degree in Computer Science. Corey is now a student at
  Dakota State University pursuing a PhD in Cyber Operations with his disse
 rtation focused on behavioral analysis of malware through machine learning
 \, and works as a software developer and reverse engineer out of San Anton
 io\, Texas.\n\nAudience - Reverse engineers​
URL:https://forum.defcon.org/node/246313
DTSTART:20230811T220000Z
DTEND:20230811T235501Z
LOCATION:Society Boardroom\, Forum
END:VEVENT
END:VCALENDAR
