Remove 07
Remove 2016 Remove Access Remove Education Remove Examples
article thumbnail

Open Source Security Podcast EP. 151 - The DARPA Cyber Grand Challenge With David Brumley

ForAllSecure

For example, one thing I've seen that is somewhat counterintuitive is the ability to change the program and to make rapid updates to it. David Brumley : 07:17 What the machine did is, it ingested program binaries, meaning we didn't have source code. David Brumley : 07:46 Then, they fixed the vulnerability. Then, what happened?

article thumbnail

Open Source Security Podcast EP. 151 - The DARPA Cyber Grand Challenge With David Brumley

ForAllSecure

For example, one thing I've seen that is somewhat counterintuitive is the ability to change the program and to make rapid updates to it. David Brumley : 07:17 What the machine did is, it ingested program binaries, meaning we didn't have source code. David Brumley : 07:46 Then, they fixed the vulnerability. Then, what happened?

article thumbnail

OPEN SOURCE SECURITY PODCAST EP. 151-- THE DARPA CYBER GRAND CHALLENGE WITH DAVID BRUMLEY

ForAllSecure

For example, one thing I've seen that is somewhat counterintuitive is the ability to change the program and to make rapid updates to it. David Brumley : 07:17 What the machine did is, it ingested program binaries, meaning we didn't have source code. David Brumley : 07:46 Then, they fixed the vulnerability. Then, what happened?