Sorry but I just found out what MEMS is and it's insane?? Incredibly tiny (micrometer scale) intricate clockwork mechanisms??? And they're in your iPhone?????
Also you can't expose them to too much helium because (I do not think I'm making this up) the helium atoms get caught in the gears? vice.com/en/article/gye…
Two clarifications from the comments: 1. The ones with gears are generally not found in phones 2. Phones have inertial sensors which are more like springs (left) and clocks which use resonators (right)
By request, here's a brief live thread on "When Malware is Packin' Heat; Limits of Machine Learning Classifiers Based on Static Analysis Features" ndss-symposium.org/wp-content/upl…
Background: packing is pervasive, and packers are now quite complex. Some have multiple layers of packing, use anti-debugging/emulation, or unpack only small fragments of code at a time.
Last session of the day at NDSS BAR features three invited talks! First, Jacopo Corbetta talks about IoT platform fuzzing at Qualcomm
Fuzzing has been very successful at Qualcomm; 100+ bugs found via fuzzing in their IoT platform. Around half from "pure" fuzzing, others from "hybrid" (manual analysis+fuzzing, etc)
"But doesn't Qualcomm have the source code?" Not always; third-party vendor code is common.
Welcome back to the NDSS Bar livetweet! In our afternoon session we're looking at obfuscation and how to defeat it. First up is Vaibhav Sharma, with "It Doesn’t Have to Be So Hard: Efficient Symbolic Reasoning for CRC"
Some papers, including some of the anti-fuzzing work from USENIX Security last year, have argued that CRCs are good for slowing down symbolic execution. Sharma et al. ask: is this true?
What do CRC implementations look like? One technique used in Fuzzitication is this
Now starting in on the research talks at NDSS BAR. First up, a talk via Skype since the authors were not able to make it due to travel restrictions: Similarity Metric Method for Binary Basic Blocks of Cross-Instruction Set Architecture
Basic background: we want to compute code similarity by finding an embedding for each basic block in a binary