Making a Scalable Automated Hacking System by Artem Dinaburg
-
Upload
shakacon -
Category
Technology
-
view
112 -
download
5
Transcript of Making a Scalable Automated Hacking System by Artem Dinaburg
![Page 1: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/1.jpg)
MakingaScalableAutomatedHackingSystem
ShakaConVIIIArtemDinaburg
artem@trailo=its.com
![Page 2: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/2.jpg)
• PrincipalSecurityEngineeratTrailofBits– artem@trailo=its.com/[email protected]– hFp://blog.trailo=its.com
AboutMe
![Page 3: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/3.jpg)
AboutThisTalk• Automatedvulnerabilitydiscoveryisaverybroadtopic.
![Page 4: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/4.jpg)
AboutThisTalk• Automatedvulnerabilitydiscoveryisaverybroadtopic.
• Thistalkisgoingtobetechnical,butaccessible.
![Page 5: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/5.jpg)
AboutThisTalk• Automatedvulnerabilitydiscoveryisaverybroadtopic.
• Thistalkisgoingtobetechnical,butaccessible.– WewilltalkaboutbuildingapracLcalsystem
![Page 6: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/6.jpg)
Outline• Part1:Learnhowourautomatedbugfindingsystemworks&howtomakeyourown
![Page 7: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/7.jpg)
Outline• Part1:Learnhowourautomatedbugfindingsystemworks&howtomakeyourown
• Part2:Understandourapproachtoautomatedbinarypatching
![Page 8: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/8.jpg)
Outline• Part1:Learnhowourautomatedbugfindingsystemworks&howtomakeyourown
• Part2:Understandourapproachtoautomatedbinarypatching
• What’sNext:thefutureofautomatedvulnerabilitydiscovery
![Page 9: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/9.jpg)
IntroducLon• TrailofBitswasacompeLtorinDARPA’sCyberGrandChallenge
![Page 10: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/10.jpg)
IntroducLon• TrailofBitswasacompeLtorinDARPA’sCyberGrandChallenge
• WebuiltCyberdyne,anautomatedbugfindingandpatchingsystem
![Page 11: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/11.jpg)
IntroducLon• TrailofBitswasacompeLtorinDARPA’sCyberGrandChallenge
• WebuiltCyberdyne,anautomatedbugfindingandpatchingsystem
• ItworkedpreFywell…
![Page 12: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/12.jpg)
2ndinBugsFound
77
65
57
57
44
39
23
12
12
9
0 10 20 30 40 50 60 70 80
TeamACyberdyne
TeamBTeamCTeamDTeamETeamFTeamGTeamHTeamI
ConfirmedBugsFound
![Page 13: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/13.jpg)
5thinPatchingEffecLveness
![Page 14: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/14.jpg)
IntroducLon• TrailofBitswasacompeLtorinDARPA’sCyberGrandChallenge
• WebuiltCyberdyne,anautomatedbugfindingandpatchingsystem
• ItworkedpreFywell…• Butdidn’tqualify 😢
![Page 15: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/15.jpg)
LastinPerformance
![Page 16: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/16.jpg)
AutomatedBugFinding
©flickruserHenriSivonen
![Page 17: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/17.jpg)
VulnerabilityDiscoveryTheory• Notoolwillfindallthebugs.• Provablyimpossible.
![Page 18: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/18.jpg)
VulnerabilityDiscoveryTheory• OverApproximateAnalyses– PointsTo– AliasAnalysis
![Page 19: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/19.jpg)
VulnerabilityDiscoveryTheory• UnderApproximateAnalyses– Fuzzing,SymbolicExecuLon
![Page 20: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/20.jpg)
Under-ApproximateAnalyses:Roadblocks
HardForFuzzing,EasyforSymbolicExecuLon
if(input[0]==0xBADFOOD)
![Page 21: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/21.jpg)
Under-ApproximateAnalyses:Roadblocks
HardforSymbolicExecuLon,EasyforFuzzing
if(hash(input[0])==hash(input[1]))
![Page 22: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/22.jpg)
Under-ApproximateAnalyses:Theory
• Alltoolsoperateoverthesamedomain
• Alldiscoveriesareequallytrue
• Whatiftoolscouldsharediscoveries?
©flickruserJean-PierreDalbéra
![Page 23: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/23.jpg)
AnalysisBoosLng• Sharingdiscoveriesacrosstoolscreatesavirtuouscyclethatremovesroadblocks
if(input[0]==0xBADFOOD)if(hash(input[0])==hash(input[1]))BUG();
![Page 24: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/24.jpg)
AnalysisBoosLng• Sharingdiscoveriesacrosstoolscreatesavirtuouscyclethatremovesroadblocks
if(input[0]==0xBADFOOD)if(hash(input[0])==hash(input[1]))BUG();
![Page 25: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/25.jpg)
AnalysisBoosLng• Sharingdiscoveriesacrosstoolscreatesavirtuouscyclethatremovesroadblocks
if(input[0]==0xBADFOOD)if(hash(input[0])==hash(input[1]))BUG();
![Page 26: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/26.jpg)
AnalysisBoosLng
• Howdoyoucombineexis1nganalysistools?
![Page 27: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/27.jpg)
AnalysisBoosLng
• Howdoyoucombineexis1nganalysistools?• ‘Universal’Knowledge:Inputs!– Kindoflame,butitworks!
![Page 28: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/28.jpg)
AnalysisBoosLng• Inputsgeneratedbyonetoolfeedintoallothers
Inputs
![Page 29: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/29.jpg)
AnalysisBoosLng• Inputsgeneratedbyonetoolfeedintoallothers
Inputs
Analyses
![Page 30: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/30.jpg)
AnalysisBoosLng• Inputsgeneratedbyonetoolfeedintoallothers
Inputs
Analyses New Inputs
![Page 31: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/31.jpg)
AnalysisBoosLng• Inputsgeneratedbyonetoolfeedintoallothers
Inputs
Analyses New Inputs
Merge Knowledge
![Page 32: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/32.jpg)
AnalysisBoosLng:ImplementaLon• TwosymbolicexecuLonengines– KLEE(viaanx86toLLVMtranslator)– PySymEmu
![Page 33: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/33.jpg)
AnalysisBoosLng:ImplementaLon• TwosymbolicexecuLonengines– KLEE(viaanx86toLLVMtranslator)– PySymEmu
• Grr:areallyawesomeDBT-basedfuzzer
![Page 34: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/34.jpg)
AnalysisBoosLng:ImplementaLon• TwosymbolicexecuLonengines– KLEE(viaanx86toLLVMtranslator)– PySymEmu
• Grr:areallyawesomeDBT-basedfuzzer• MergeknowledgeviaMinSet– Minimalsetofmaximalcoverageinputs
![Page 35: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/35.jpg)
PracLcalConsideraLons:MinSet• MinimizingtheinputsetisessenLalforanalysisboosLngtobepracLcal.
![Page 36: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/36.jpg)
PracLcalConsideraLons:MinSet• MinimizingtheinputsetisessenLalforanalysisboosLngtobepracLcal.
• MinSetneedsafastmethodtomeasureandcomparecoverage.
![Page 37: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/37.jpg)
PracLcalConsideraLons:MinSet• MinimizingtheinputsetisessenLalforanalysisboosLngtobepracLcal.
• MinSetneedsafastmethodtomeasureandcomparecoverage.
• Doesn’thavetobeperfect.
![Page 38: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/38.jpg)
AutomatedBugFinding:BuildingIt
©flickruserJuliaManzerova
![Page 39: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/39.jpg)
BuildingYourOwn
A NB
• Step1:Findthetoolstocombine
![Page 40: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/40.jpg)
BuildingYourOwn• Step2:Wrapyourtoolswithamanagerscript
A NB
![Page 41: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/41.jpg)
BuildingYourOwn• Step3• WriteTests
• WriteTests
• WriteTests
![Page 42: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/42.jpg)
BuildingYourOwn• Step4:SharedResources
A NB
MessageQueueDistributed Storage
![Page 43: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/43.jpg)
BuildingYourOwn• Step5:MinSet
A NB
MessageQueueDistributed Storage
![Page 44: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/44.jpg)
BuildingYourOwn• Step6• WriteTests
• WriteTests
• WriteTests
![Page 45: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/45.jpg)
BuildingYourOwn• Step7:MonitoringandStaLsLcs
A NB
MessageQueueDistributed Storage
![Page 46: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/46.jpg)
BuildingYourOwn• Step8:ControlandProvision
MessageQueueDistributed Storage
MessageQueueDistributed Storage
MessageQueueDistributed Storage
MessageQueueDistributed Storage
MessageQueueDistributed Storage
MessageQueueDistributed Storage
MessageQueueDistributed Storage
MessageQueueDistributed Storage
Control & Provision
![Page 47: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/47.jpg)
ObligatoryAFLComparison
78
69
68
65
61
16
14
0 10 20 30 40 50 60 70 80
Boosted(current)
Boosted(CQE)
AFL(DrillerPaper)
Union(KLEE,PSE,Grr)
Grr(Fuzzing)
PSE(Symbolic)
KLEE(Symbolic)
BugsFoundinCQEBinariesByMethod
(approximate)
![Page 48: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/48.jpg)
Patching
©USArmy
![Page 49: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/49.jpg)
Patching• Makethebinarynotcrash
![Page 50: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/50.jpg)
Patching• Makethebinarynotcrash• PatchingMethod– Whatdoyou“fix”?
![Page 51: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/51.jpg)
Patching• Makethebinarynotcrash• PatchingMethod– Whatdoyou“fix”?
• PatchingMechanics– Howdoyouapplythe“fix”?
![Page 52: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/52.jpg)
Patching• Makethebinarynotcrash• PatchingMethod– Whatdoyou“fix”?
• PatchingMechanics– Howdoyouapplythe“fix”?
• PatchLocaLon– Wheredoyoufix,ifyouaren’tsureofthebug?
![Page 53: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/53.jpg)
Patching• PatchingMethod– Preventaccesstoinvalidmemory
![Page 54: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/54.jpg)
Patching• PatchingMethod– Preventaccesstoinvalidmemory
• PatchingMechanics– TranslatebinarytoLLVM,patchthebitcode
![Page 55: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/55.jpg)
PatchingviaLLVM
Bin LLVMPatchBin
PatchLLVM
![Page 56: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/56.jpg)
Patching• PatchingMethod– Preventaccesstoinvalidmemory
• PatchingMechanics– TranslatebinarytoLLVM,patchthebitcode
• PatchLocaLon– Specificvs.Generic
![Page 57: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/57.jpg)
PatchLocaLon:SpecificPatching• So,wehavethisthingthatfindsbugs…– Letsjustpatchthose
• Insertcheckformemoryvalidity• Problems– Wrongbug– MulLplecodepaths
![Page 58: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/58.jpg)
PatchLocaLon:GenericPatching• Fixeverybugofacertainclass• Examples:– StackCookies– ASLR– CFI
• Problem:slow
![Page 59: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/59.jpg)
PatchingProblems• Slow.Bloated.
![Page 60: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/60.jpg)
Patching:EntertheDragon
![Page 61: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/61.jpg)
PatchingMontage• Cross-BlockDeadStoreEliminaLon
![Page 62: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/62.jpg)
PatchingMontage• Cross-BlockDeadStoreEliminaLon• Unusedregisteranalysis
![Page 63: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/63.jpg)
PatchingMontage• Cross-BlockDeadStoreEliminaLon• Unusedregisteranalysis• DominatorTreeTraversal
![Page 64: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/64.jpg)
PatchingMontage• Cross-BlockDeadStoreEliminaLon• Unusedregisteranalysis• DominatorTreeTraversal• DataFlowfrominputs
![Page 65: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/65.jpg)
PatchingMontage• Cross-BlockDeadStoreEliminaLon• Unusedregisteranalysis• DominatorTreeTraversal• DataFlowfrominputs• CombinaLonsoftheabove
![Page 66: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/66.jpg)
Reminder:LastinPerformance
![Page 67: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/67.jpg)
What’sNext?• CyberGrandChallengeconLnues!• FinalsareAugust4th,co-locatedwithDEFCON– Freetoenter
• WinnerwillplaythewinninghumanCTFteamatDEFCON
![Page 69: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/69.jpg)
What’sNext?• Integratemoretoolsandknowledge!– AFL(viaNCC’sprojecttriforce)– Grammar-basedfuzzers– InformaLonfromcompiler/sourcecode
• Broaderlibrarysupport
![Page 70: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/70.jpg)
What’sNext?• Letsautomate(orsemi-automate)boringassessmentwork.
• WearedoingapilotauditofzlibfortheMozillaFoundaLon.
• EventuallywewouldliketoautomaLcallyauditopensourcesosware.
![Page 71: Making a Scalable Automated Hacking System by Artem Dinaburg](https://reader033.fdocuments.us/reader033/viewer/2022051706/58f033d11a28ab387f8b4571/html5/thumbnails/71.jpg)
QuesLons?ContactInformaLon:
artem@trailo=its.comhFp://blog.trailo=its.com
FurtherReading:hFp://blog.trailo=its.com/2015/07/15/how-we-fared-in-the-cyber-grand-challenge/hFp://blog.trailo=its.com/2016/01/13/hacking-for-charity-automated-bug-finding-in-libotr/hFps://github.com/trailo=its/mcsemahFps://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentaLon/walker