Static Instrumentation Based on Executable File Formats
Offered By: Recon Conference via YouTube
Course Description
Overview
Explore static instrumentation techniques for executable file formats in this 26-minute conference talk from Recon 2018 Montreal. Discover how modifying executable formats enables architecture-independent injection and hooking without requiring privileged environments. Learn about alternatives to traditional instrumentation methods that modify code or system environments, which may not work in scenarios with integrity checking or non-rooted environments. Gain insights from security engineer Romain Thomas, who specializes in developing tools for security researchers and has expertise in Android internals, (de)obfuscation, and software protections. Understand the potential applications and benefits of these techniques in various security research scenarios.
Syllabus
Recon 2018 Montreal - Static instrumentation based on executable file formats by Romain Thomas
Taught by
Recon Conference
Related Courses
Harnessing Intel Processor Trace on Windows for FuzzRecon Conference via YouTube Reverse Engineering Satellite Based IP Content Distribution
Recon Conference via YouTube Reverse Engineering Windows Defender's JavaScript Engine
Recon Conference via YouTube DIY ARM Debugger for Wi-Fi Chips
Recon Conference via YouTube Subverting Your Server Through Its BMC - The HPE iLO4 Case
Recon Conference via YouTube