YoVDO

Pushing Security Left by Mutating Byte Code

Offered By: nullcon via YouTube

Tags

nullcon Courses Reverse Engineering Courses Encryption Courses Software Security Courses Obfuscation Courses Cross-Compilation Courses

Course Description

Overview

Explore techniques for enhancing software security through bytecode mutation in this conference talk from Nullcon Goa 2022. Learn about building secure software, protecting against reverse engineering, and implementing advanced security measures like code minification, obfuscation, and encryption. Discover a proposed solution called Mutant, which offers a new high-level programming language for writing secure code and a compiler for protecting existing binaries. Gain insights into constant obfuscation, cross-compilation, encryption methods, and memory capture techniques. Understand the limitations of these approaches and explore key generation strategies for improved software protection.

Syllabus

Introduction
Agenda
Push Security Left
Debug Version
Constant Obfuscation
Cross Compilation
Binary
Debug
Theory
Encryption
Capture Memory
Testing
Limitations
Key Generation
Website
Questions


Taught by

nullcon

Related Courses

Internet History, Technology, and Security
University of Michigan via Coursera
Sicherheit im Internet
openHPI
أساسيات التشفير
Rwaq (رواق)
Desarrollo de Aplicaciones Web: Seguridad
University of New Mexico via Coursera
Web Application Development: Security
University of New Mexico via Coursera