Eliminating Vulnerabilities in Third-Party Code with Binary Analysis

Over the last few years, has moved from a minor factor in to a dominant force in the industry. According to VDC Research, the majority of software that runs on is now developed by external sources, as opposed to in-house development teams. As a result of this outsourcing, the behaviors of significant parts of applications are actually hidden from most of today's popular tools. 's , on the other hand, uses to examine third-party code without access to its . This paper describes how to use binary analysis to inspect your third-party code for vulnerabilities and other errors.