Ever wonder how static analysis tools figure out not only what lines contribute to a buffer overflow, but by how much it can be overflown? Ever get the sense developers might get insecure solutions from StackOverflow, and wonder what can be done about it? Curious about what you might be able to do if only you could get your hands on some industrial robots, field forensic equipment, voting machines, or avionics? We discuss some of the latest developments in infosec coming from academia, what they’re likely to result in, and of course, where more work is needed.
Falcon Darkstar Momot, Brittany ""Straithe"" Postnikoff