Black Hat USA 2025 | How Tree-of-AST Redefines the Boundaries of Dataflow Analysis
Why It Matters
Tree-of-AST promises more accurate, scalable vulnerability discovery in complex open-source and ML projects, reducing false positives and improving supply-chain security posture. That capability can speed triage, increase true-positive finds (including exploitable CVEs), and change how firms prioritize code-risk remediation.
Summary
At Black Hat USA 2025, researchers presented Tree-of-AST, a novel dataflow-analysis approach that adapts tree-based generative reasoning techniques (inspired by Tree-of-Thoughts) to program ASTs to more effectively trace sources to sinks and reason about sanitizers. The presenters — including a teenage researcher — described an algorithm that explores multiple reasoning branches, uses voting/lookahead and backtracking to prune paths, and scales to large, messy ML codebases. They demonstrated the method by rediscovering previously reported CVEs and showing improved precision and reachability grounding versus traditional linear analyses. The talk emphasized practical tooling and case studies rather than purely theoretical results.
Comments
Want to join the conversation?
Loading comments...