YoVDO

Static Instrumentation Based on Executable File Formats

Offered By: Recon Conference via YouTube

Tags

REcon Conference Courses Security Research Courses

Course Description

Overview

Explore static instrumentation techniques for executable file formats in this 26-minute conference talk from Recon 2018 Montreal. Discover how modifying executable formats enables architecture-independent injection and hooking without requiring privileged environments. Learn about alternatives to traditional instrumentation methods that modify code or system environments, which may not work in scenarios with integrity checking or non-rooted environments. Gain insights from security engineer Romain Thomas, who specializes in developing tools for security researchers and has expertise in Android internals, (de)obfuscation, and software protections. Understand the potential applications and benefits of these techniques in various security research scenarios.

Syllabus

Recon 2018 Montreal - Static instrumentation based on executable file formats by Romain Thomas


Taught by

Recon Conference

Related Courses

Assembly Language Adventures (1): Counting with two digits
Udemy
Assembly Language Adventures: Complete Course
Udemy
OWASP Top 10 - A10:2021 - Server-Side Request Forgery (SSRF)
Cybrary
Analyzing Wi-Fi Wardriving Data with Google Colab
SecurityFWD via YouTube
Firing Rounds at the Analysis Shooting Gallery - CSAW'16 Security Workshop
New York University (NYU) via YouTube