Главная
Study mode:
on
1
Intro
2
Disclaimer
3
Outline
4
Scope
5
Why Reverse Engineering
6
Source Code
7
Binary
8
Disassemblyrs
9
Table Lookup
10
Decompiler
11
IDE is not an analysis tool
12
Blackbox analysis
13
Where to apply it
14
Vulnerability discovery
15
Static and dynamic approaches
16
Obstacles
17
Disassembly
18
Antidebugging
19
Virtualizing obfuscs
20
VMProtect
21
State Machine
22
Strings
Description:
Explore reverse engineering techniques in this comprehensive conference talk from OISF 2013. Delve into topics such as source code analysis, binary disassembly, decompilation, and blackbox analysis. Learn about vulnerability discovery, static and dynamic approaches, and obstacles like anti-debugging and virtualization obfuscation. Gain insights into where to apply reverse engineering and understand the importance of tools beyond integrated development environments (IDEs). Discover techniques for handling string analysis and state machines in the context of reverse engineering.

Reverse Engineering Demystified - OISF 2013

Add to list
0:00 / 0:00