YoVDO

Logic Against Sneak Obfuscated Malware

Offered By: NorthSec via YouTube

Tags

NorthSec Courses Malware Analysis Courses Symbolic Execution Courses SMT Solvers Courses

Course Description

Overview

Explore the world of malware analysis and code deobfuscation in this 22-minute conference talk by ThaĆ­s aka barbie Moreira Hamasaki at NorthSec. Dive into the sneaky nature of malicious code and learn how it employs packing and obfuscation techniques to evade detection and hinder analysis. Discover the power of SMT solvers as advanced analysis tools that go beyond standard debuggers, offering enhanced adaptability and automation. Gain insights into practical applications of SMT solvers in IT security, focusing on binary static analysis and code deobfuscation. Examine the theoretical limitations and practical solutions in this field. The talk covers topics such as constraints, symbolic execution, exploitation, workstation setup, garbage code, pickers, and the potential of SMT solvers as powerful tools for short searches and generic code analysis. Understand the future plans and possibilities in this crucial area of cybersecurity.

Syllabus

Intro
Outline
What are constraints
How SMT solvers work
Symbolic execution
Symbolic education
Symbolic model
Exploitation
Workstation
Garbage code
Pickers
Limitations
Practical
Powerful tool
Short search
Generic code
Future plans


Taught by

NorthSec

Related Courses

Reverse Engineering 3201: Symbolic Analysis
OpenSecurityTraining2 via Independent
SMT- Quantifiers, and Future Prospects - IPAM at UCLA
Institute for Pure & Applied Mathematics (IPAM) via YouTube
SMT Solvers in IT Security - Deobfuscating Binary Code with Logic
Cooper via YouTube
Jumping the Fence - Comparison and Improvements for Existing Jump Oriented Programming Tools
YouTube
Jumping the Fence - Comparison and Improvements for Existing Jump Oriented Programming Tools
YouTube