YoVDO

Backward-Bounded DSE - Targeting Infeasibility Questions on Obfuscated Codes

Offered By: IEEE via YouTube

Tags

Reverse Engineering Courses Malware Analysis Courses Security Analysis Courses

Course Description

Overview

Explore a 22-minute IEEE conference talk on Backward-bounded DSE, a novel approach for addressing infeasibility questions in software deobfuscation and malware analysis. Learn how this method complements existing Dynamic Symbolic Execution techniques by offering a precise, efficient, and robust solution for detecting protection schemes like opaque predicates and call stack tampering. Discover the successful application of Backward-bounded DSE on state-of-the-art packers and the government-grade X-Tunnel malware, leading to complete deobfuscation. Gain insights into sparse disassembly, a combination of Backward-bounded DSE and static disassembly that enhances dynamic disassembly capabilities for heavily-obfuscated binaries. Understand the potential impact of this research on developing more robust, efficient, and precise disassembly tools for security analysis.

Syllabus

Introduction
Why Manual Duplication
Control Flow Graph Recovery
Binary Code
Attack Predicate
Tag Tampering
Small Graph
Dynamic Analysis
Dynamic Symbolic Execution
Challenge
Experimental Evaluation
Control Experiments
Conclusion


Taught by

IEEE Symposium on Security and Privacy

Tags

Related Courses

Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Palo Alto Networks Cybersecurity Essentials II
Palo Alto Networks via Coursera
Introducción al Análisis del Malware en Windows
National Technological University – Buenos Aires Regional Faculty via Miríadax
Android Malware Analysis - From Zero to Hero
Udemy
How to Create and Embed Malware (2-in-1 Course)
Udemy