Reverse engineers can finally take a sigh of relief thanks to AIS’s new program, Byte Taint Resonance Imaging, aka ByteRI, which will make a major impact in the practice of dynamic taint analysis.
What is ByteRI?
ByteRI is the solution to a multitude of laborious and inefficient reverse engineering programs.
By individually tainting each byte of an input and tracing the flow of these byte-taints through ByteRI, associations between the input fields and code instructions that depend on them are uncovered.
What problem does ByteRI solve?
Reverse engineers are tasked with discovering what programs do while simultaneously learning how it does it. This is not an easy task and involves the creation of new inputs to drive the program’s execution toward unexplored code.
How Does it Work?
The ByteRI program analysis leverages dynamic taint analysis to discover mappings between input data and code that operates on this data. This allows users to visualize how the choice of input impacts control flow and uncover the syntax of a program’s anticipated inputs, including fields, separators and terminals. Analysis results will be integrated into modern reverse engineering and vulnerability discovery toolsets.
How does this impact reverse engineering and vulnerability tasks?
Simply said, tasks will be easier, more accurate and more efficient. Human reverse engineers will save time by being able to more quickly understand previously unseen code. Vulnerability discovery tools will more quickly discover inputs that trigger bugs representing potentially weaponizable vulnerabilities.