Emotion Labs

Emotion Labs

Democratizing program analysis

Software vulnerabilities live in the murky space between the intended design of the software and our understanding of its actual implementation. Using cutting-edge program analysis techniques, Emotion Labs eliminates flaws in customer understanding of every bit of their software, illuminating and eliminating the space where vulnerabilities lurk.

Services

Education and Training

Program analysis is a complex field of research, and getting up to speed with knowledge and tools is a major time investment. Optimize your educational ramp time with Emotion Labs training.

We offer training courses covering modern binary analysis techniques from the basics to advanced topics including automated program analysis with angr. Contact us to schedule your customized training event.

Research and Development

Developing solutions to complex program analysis challenges is our specialty. We proudly open-source much of our work, including the leading open-source program analysis platform angr.

We offer development of customized program analysis solutions tailored to client needs. Contact us to see how Emotion Labs can help solve your program analysis challenges.

About Us

Emotion Labs is passionate about solving real-world complex program analysis challenges with innovative solutions and making program analysis technology available to all.

matt

Matt Borgerson

@MattBorgerson

Matt's interest in binary analysis dates back to original Xbox console hacking in 2001. With a love for all things low-level, Matt started his career in firmware development and along the way found opportunities to work in various fields including emulation, audio, graphics, and networking. He has always been passionate about understanding how things work and discovering ways to make them do new, interesting things. Today, he is developing the next-generation binary analysis platform angr. In his free time you might find him working on console emulation or game decompilation projects.

fish

Fish Wang

@ltfish

Fish Wang is an Assistant Professor at Arizona State University. He is extremely interested in demystifying all sorts of binary code, and his main research interests are software vulnerability discovery, automated exploit generation, and binary decompilation. Fish is a co-founder and a core maintainer of angr.

zardus

Yan Shoshitaishvili

@zardus

Yan Shoshitaishvili is an Assistant Professor at Arizona State University, where he pursues parallel passions of cybersecurity research, real-world impact, and education. His research focuses on automated program analysis and vulnerability detection techniques. Aside from publishing dozens of research papers in top academic venues, Yan led Shellphish’s participation in the DARPA Cyber Grand Challenge, achieving the creation of a fully autonomous hacking system that won third place in the competition.

Underpinning much of his research is angr, the open-source program analysis framework created by Yan and his collaborators. This framework has powered hundreds of research papers, helped find thousands of security bugs, and continues to be used in research labs and companies around the world.

When he is not doing research, Yan participates in the enthusiast and educational cybersecurity communities. He is a Captain Emeritus of Shellphish, one of the oldest ethical hacking groups in the world, and a founder of the Order of the Overflow, with whom he ran DEF CON CTF, the “world championship” of cybersecurity competitions, from 2018 through 2021. Now, he helps demystify the hacking scene as a co-host of the CTF RadiOOO podcast and forge connections between the government and the hacking community through his participation on CISA’s Technical Advisory Council. In order to inspire students to pursue cybersecurity (and, ultimately, compete at DEF CON!), Yan created pwn.college, an open practice-makes-perfect learning platform that is revolutionizing cybersecurity education for aspiring hackers around the world.

rhelmot

Audrey Dutcher

@rhelmot

Audrey is a PhD student at Arizona State university. She loves reverse engineering, fruit, Celeste (2018), Python, Rust, and symbolic execution.

Contact

We'd love to hear from you!

If you're interested in scheduling a customized training event, working together to solve complex challenges, or just want to get in touch, we would love to hear from you.