Главная
Study mode:
on
1
Introduction
2
Objectives
3
Agenda
4
What is Code Deobfuscation
5
Applications of Deobfuscation
6
Opak Predicate
7
Opak Constant Tempering
8
Disassembly
9
Symbolic Execution
10
Why use a Dynamic Symbolic Execution
11
Dynamic Symbolic Summary
12
Dynamic Symbolic Execution
13
External
14
Analysis Context
15
Analysis Results
16
Takeaways
17
Questions
Description:
Explore code deobfuscation techniques in this 51-minute Black Hat conference talk. Delve into the world of software protection and learn how obfuscation is used to slow down program analysis. Discover the interplay between dynamic, static, and symbolic approaches to deobfuscation. Examine applications in the video game industry and beyond. Gain insights into opaque predicates, constant tempering, disassembly, and symbolic execution. Understand the benefits of dynamic symbolic execution and its role in code analysis. Follow along as speakers Robin David and Sébastien Bardin break down complex concepts, provide real-world examples, and offer valuable takeaways for security professionals and software analysts.

Code Deobfuscation - Intertwining Dynamic, Static and Symbolic Approaches

Black Hat
Add to list
0:00 / 0:00