Главная
Study mode:
on
1
Intro
2
Outline
3
What are constraints
4
How SMT solvers work
5
Symbolic execution
6
Symbolic education
7
Symbolic model
8
Exploitation
9
Workstation
10
Garbage code
11
Pickers
12
Limitations
13
Practical
14
Powerful tool
15
Short search
16
Generic code
17
Future plans
Description:
Explore the world of malware analysis and code deobfuscation in this 22-minute conference talk by Thaís aka barbie Moreira Hamasaki at NorthSec. Dive into the sneaky nature of malicious code and learn how it employs packing and obfuscation techniques to evade detection and hinder analysis. Discover the power of SMT solvers as advanced analysis tools that go beyond standard debuggers, offering enhanced adaptability and automation. Gain insights into practical applications of SMT solvers in IT security, focusing on binary static analysis and code deobfuscation. Examine the theoretical limitations and practical solutions in this field. The talk covers topics such as constraints, symbolic execution, exploitation, workstation setup, garbage code, pickers, and the potential of SMT solvers as powerful tools for short searches and generic code analysis. Understand the future plans and possibilities in this crucial area of cybersecurity.

Logic Against Sneak Obfuscated Malware

NorthSec
Add to list
0:00 / 0:00