Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. For this #ThrowbackThursday, we will look at #ACSAC2025's Reverse Engineering and Vulnerability Detection session.

For this #ThrowbackThursday, we will look at #ACSAC2025's Reverse Engineering and Vulnerability Detection session.

Scheduled Pinned Locked Moved Uncategorized
throwbackthursdacsac2025
2 Posts 1 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • acsac_conf@infosec.exchangeA This user is from outside of this forum
    acsac_conf@infosec.exchangeA This user is from outside of this forum
    acsac_conf@infosec.exchange
    wrote last edited by
    #1

    For this #ThrowbackThursday, we will look at #ACSAC2025's Reverse Engineering and Vulnerability Detection session. The links in this thread will lead you to the paper pdfs and the slide decks, so be sure to check them out! 1/6

    Link Preview Image
    acsac_conf@infosec.exchangeA 1 Reply Last reply
    1
    0
    • acsac_conf@infosec.exchangeA acsac_conf@infosec.exchange

      For this #ThrowbackThursday, we will look at #ACSAC2025's Reverse Engineering and Vulnerability Detection session. The links in this thread will lead you to the paper pdfs and the slide decks, so be sure to check them out! 1/6

      Link Preview Image
      acsac_conf@infosec.exchangeA This user is from outside of this forum
      acsac_conf@infosec.exchangeA This user is from outside of this forum
      acsac_conf@infosec.exchange
      wrote last edited by
      #2

      Opening the session was Anwar et al.'s "VerDiff: Vulnerability Presence Verification for Comprehensive Reporting Using Constraint Programming" on rapidly verifying affected software versions and correcting advisory misclassifications. (https://www.acsac.org/2025/program/final/s53.html) 2/6
      #CyberSecurity

      Link Preview Image
      1 Reply Last reply
      1
      0
      • R relay@relay.infosec.exchange shared this topic
      Reply
      • Reply as topic
      Log in to reply
      • Oldest to Newest
      • Newest to Oldest
      • Most Votes


      • Login

      • Login or register to search.
      • First post
        Last post
      0
      • Categories
      • Recent
      • Tags
      • Popular
      • World
      • Users
      • Groups