Next Generation Virtualization-Based Obfuscators
Offered By: Hack In The Box Security Conference via YouTube
Course Description
Overview
Explore the cutting-edge world of code obfuscation in this 59-minute conference talk from the Hack In The Box Security Conference. Delve into an overview of contemporary code obfuscation schemes, focusing on the design and architecture of virtual machines. Examine the weaknesses of established approaches, including their reliance on fixed instruction set architectures and weak obfuscation of individual components. Learn about various deobfuscation attacks such as compiler optimizations, symbolic execution, and program synthesis, and understand how they can efficiently deobfuscate VM components and reconstruct protected code. Discover the core design principles behind next-generation virtual machines and how they aim to counter these attacks. Investigate concrete methods for generating target-specific instruction set architectures and intertwined VM components, and understand their synergistic effects in withstanding specific attacks. Gain insights into how these techniques will shape the landscape of modern obfuscation in the coming years and the necessary advancements in code deobfuscation research to tackle these advanced virtual machines.
Syllabus
#HITB2023AMS D1T2 - Next Generation Virtualization-Based Obfuscators - T. Blazytko & M. Schloegel
Taught by
Hack In The Box Security Conference
Related Courses
Browser Hacking With ANGLEHack In The Box Security Conference via YouTube Can A Fuzzer Match A Human
Hack In The Box Security Conference via YouTube Biometrics System Hacking in the Age of the Smart Vehicle
Hack In The Box Security Conference via YouTube ICEFALL - Revisiting A Decade Of OT Insecure-By-Design Practices
Hack In The Box Security Conference via YouTube Fuzzing the MCU of Connected Vehicles for Security and Safety
Hack In The Box Security Conference via YouTube