YoVDO

Pushing Security Left by Mutating Byte Code

Offered By: nullcon via YouTube

Tags

nullcon Courses Reverse Engineering Courses Encryption Courses Software Security Courses Obfuscation Courses Cross-Compilation Courses

Course Description

Overview

Explore techniques for enhancing software security through bytecode mutation in this conference talk from Nullcon Goa 2022. Learn about building secure software, protecting against reverse engineering, and implementing advanced security measures like code minification, obfuscation, and encryption. Discover a proposed solution called Mutant, which offers a new high-level programming language for writing secure code and a compiler for protecting existing binaries. Gain insights into constant obfuscation, cross-compilation, encryption methods, and memory capture techniques. Understand the limitations of these approaches and explore key generation strategies for improved software protection.

Syllabus

Introduction
Agenda
Push Security Left
Debug Version
Constant Obfuscation
Cross Compilation
Binary
Debug
Theory
Encryption
Capture Memory
Testing
Limitations
Key Generation
Website
Questions


Taught by

nullcon

Related Courses

Amazon DynamoDB Deep Dive
A Cloud Guru
AWS Security Essentials
A Cloud Guru
AZ-500: Microsoft Azure Security Technologies (LA)
A Cloud Guru
Encryption Fundamentals
A Cloud Guru
Google Cloud Certified Professional Cloud Security Engineer
A Cloud Guru