YoVDO

Code Deobfuscation - Intertwining Dynamic, Static and Symbolic Approaches

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Cybersecurity Courses Symbolic Execution Courses Dynamic Analysis Courses Static Analysis Courses

Course Description

Overview

Explore code deobfuscation techniques in this 51-minute Black Hat conference talk. Delve into the world of software protection and learn how obfuscation is used to slow down program analysis. Discover the interplay between dynamic, static, and symbolic approaches to deobfuscation. Examine applications in the video game industry and beyond. Gain insights into opaque predicates, constant tempering, disassembly, and symbolic execution. Understand the benefits of dynamic symbolic execution and its role in code analysis. Follow along as speakers Robin David and Sébastien Bardin break down complex concepts, provide real-world examples, and offer valuable takeaways for security professionals and software analysts.

Syllabus

Introduction
Objectives
Agenda
What is Code Deobfuscation
Applications of Deobfuscation
Opak Predicate
Opak Constant Tempering
Disassembly
Symbolic Execution
Why use a Dynamic Symbolic Execution
Dynamic Symbolic Summary
Dynamic Symbolic Execution
External
Analysis Context
Analysis Results
Takeaways
Questions


Taught by

Black Hat

Related Courses

Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security Chip
Black Hat via YouTube
Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube
AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube
Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube
Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube