YoVDO

An Effective Approach to Software Obfuscation

Offered By: Security BSides San Francisco via YouTube

Tags

Security BSides Courses Reverse Engineering Courses Software Security Courses

Course Description

Overview

Explore an effective approach to software obfuscation in this 26-minute conference talk from BSidesSF 2020. Delve into the essential aspects of obfuscation, uncovering the fundamental flaws in modern implementations and learning the correct way to approach this critical security technique. Examine examples of current obfuscation methods, understand the deobfuscation process, and discover key concepts such as Control-Flow Graph (CFG) Flattering Theory. Learn about innovative solutions, including disassembly desynchronization and opaque predicates, to enhance software protection. Gain valuable insights into hiding genuine instructions and walk away with a main takeaway that will transform your understanding of effective software obfuscation.

Syllabus

Intro
What is Software Obfuscation!
More Definitions..
Software Obfuscation != Cryptography
Deobfuscation Process
Effects of Modern Obfuscation
Control-Flow Graph (CFG) Flattering Theory
Modern Obfuscation = Noisy!
Solution
Disassembly Desynchronization
Opaque Predicates
Hiding Genuine Instruction Displayed
Main Takeaway


Taught by

Security BSides San Francisco

Related Courses

Pattern-Oriented Software Architectures: Programming Mobile Services for Android Handheld Systems
Vanderbilt University via Coursera
Engineering Maintainable Android Apps
Vanderbilt University via Coursera
Software Design as an Element of the Software Development Lifecycle
University of Colorado System via Coursera
Secure Software Development
Pluralsight
Secure Software Concepts for CSSLPĀ®
Pluralsight