YoVDO

Reverse Engineering of Black Box Binaries with Symbolic and Concolic Execution Technique

Offered By: Recon Conference via YouTube

Tags

REcon Conference Courses Cybersecurity Courses Reverse Engineering Courses Symbolic Execution Courses Fuzzing Courses Vulnerability Research Courses

Course Description

Overview

Explore advanced reverse engineering techniques in this 30-minute conference talk from Recon2022. Learn how to tackle complex binaries with large control-flow graphs using symbolic and concolic execution. Discover the power of symbolic execution for matching binary states with corresponding inputs, and apply these methods to crackme solving, deobfuscation, and advanced fuzzing. Gain hands-on experience with the angr framework, identifying and resolving common issues. Follow along as speaker Jannis Kirschner, a Swiss Vulnerability Researcher and CTF player, demonstrates how to speed up the reverse engineering process using SMT solving and symbolic execution. By the end of this talk, approach intimidating control-flow graphs with confidence, knowing when and how to leverage symbolic execution for CTF challenges and vulnerability research.

Syllabus

Recon2022 - Reverse engineering of black box binaries with symbolic and concolic execution technique


Taught by

Recon Conference

Related Courses

Formal Software Verification
University System of Maryland via edX
Software Analysis & Testing
Georgia Institute of Technology via Udacity
Computer Systems Security
Massachusetts Institute of Technology via MIT OpenCourseWare
Reverse Engineering 3201: Symbolic Analysis
OpenSecurityTraining2 via Independent
angr: Binary Analysis Framework - Demonstration and Analysis
New York University (NYU) via YouTube