Reverse engineering typically involves activities ranging from reading
disassembly output to playing with debuggers. However, an often
overlooked technique is making use of dynamic binary analysis
frameworks.
In this talk, we will be looking at Intel's solution, PIN,
and walk through how just about anyone can make great use of it. We will
discuss reasons why more people should use these tools, some novel uses
(including finding bugs and solving ctf challenges automatically), and
even introduce our own python bindings for Pin which will make writing
pin tools a breeze. Automated binary analysis is an extremely useful
technique and we feel that the use of Python and Pin will making jumping
in less intimidating.
We will also demonstrate the ease of use by
showing some real world examples and tackling some commonly seen issues
when dealing with binary analysis.