API Deobfuscator - Identifying Runtime-Obfuscated API Calls Via Memory Access Analysis
Offered By: Black Hat via YouTube
Course Description
Overview
Explore an innovative approach to API deobfuscation in this 27-minute Black Hat conference talk. Delve into a resilient method based on memory access analysis that overcomes the limitations of traditional pattern-based techniques for identifying runtime-obfuscated API calls. Learn how this approach utilizes the memory access patterns of runtime-obfuscation techniques, particularly those used by advanced obfuscators like Themida. Discover how the presented API deobfuscator tracks memory accesses using Intel Pin, executes Themida packed binary files, and restores obfuscated API function calls to their original form. Gain insights into the process of constructing a map from API functions to obfuscated function addresses and how this map is used to identify original API functions. Understand the advantages of this method in reversing engineering efforts and its compatibility with common debuggers like Ollydbg.
Syllabus
API Deobfuscator: Identifying Runtime - Obfuscated API Calls Via Memory Access Analysis
Taught by
Black Hat
Related Courses
Dal Reverse engineering alla stampa 3DUniversity of Naples Federico II via Federica Rapid Manufacturing
Indian Institute of Technology Kanpur via Swayam Generative Design for Industrial Applications
Autodesk via Coursera Fundamentos de Ciberseguridad: un enfoque práctico
Inter-American Development Bank via edX Functional And Conceptual Design
Indian Institute of Technology Madras via Swayam