The Next Generation of Virtualization Based Obfuscators
Offered By: Recon Conference via YouTube
Course Description
Overview
Explore the future of code obfuscation in this 53-minute conference talk from Recon 2022. Dive into an overview of contemporary code obfuscation schemes, focusing on the design and architecture of virtual machines. Examine the weaknesses of established approaches and learn how modern virtual machines can be broken using (semi-)automated methods. Discover the core design principles behind next-generation virtual machines and understand how they exploit inherent weaknesses in deobfuscation techniques to achieve long-lasting resilience. Gain insights into how these advanced techniques will shape the landscape of modern obfuscation in the coming years. Conclude with a discussion on the necessary advancements in code deobfuscation research to tackle these sophisticated virtual machines. Presented by Tim Blazytko, a renowned binary security researcher and co-founder of emproof GmbH, and Moritz Schloegel, a binary security researcher and PhD student at Ruhr-Universität Bochum, this talk offers valuable knowledge for those interested in the cutting edge of code obfuscation and deobfuscation techniques.
Syllabus
Recon 2022 - The Next Generation of Virtualization based Obfuscators
Taught by
Recon Conference
Related Courses
Emerging Technologies CapstoneYonsei University via Coursera Microsoft Azure Virtual Machines
Microsoft via edX Introduction to Microsoft Azure
Microsoft via edX Google Cloud Fundamentals: Core Infrastructure
Google via Coursera Build a Modern Computer from First Principles: Nand to Tetris Part II (project-centered course)
Hebrew University of Jerusalem via Coursera