YoVDO

fn_fuzzy - Fast Multiple Binary Diffing Triage With IDA

Offered By: Hack In The Box Security Conference via YouTube

Tags

Hack In The Box Security Conference Courses Reverse Engineering Courses Malware Analysis Courses IDA Pro Courses

Course Description

Overview

Explore an innovative approach to fast multiple binary diffing triage using IDA Pro in this conference talk from the Hack In The Box Security Conference. Learn about fn_fuzzy, a tool designed to quickly identify similar and previously analyzed IDB files for malware reverse engineers. Discover how this light-weight binary diffing tool calculates two types of fuzzy hashes for each function in IDBs: ssdeep hash values of code bytes and Machoc hash values of call flow graphs. Understand the advantages of fn_fuzzy over other binary diffing tools like BinDiff, Diaphora, and Kam1n0 in terms of speed and efficiency. Gain insights into how this tool can significantly improve the workflow of experienced reverse engineers dealing with hundreds or thousands of IDBs, allowing them to focus on new functions and import findings from previously analyzed databases more effectively.

Syllabus

#HITB2019AMS D1T2 - fn_fuzzy: Fast Multiple Binary Diffing Triage With IDA - Takahiro Haruyama


Taught by

Hack In The Box Security Conference

Related Courses

Dal Reverse engineering alla stampa 3D
University of Naples Federico II via Federica
Rapid Manufacturing
Indian Institute of Technology Kanpur via Swayam
Generative Design for Industrial Applications
Autodesk via Coursera
Fundamentos de Ciberseguridad: un enfoque práctico
Inter-American Development Bank via edX
Functional And Conceptual Design
Indian Institute of Technology Madras via Swayam