Completed
Crypto Functions in Malware
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Cryptographic Function Detection in Obfuscated Binaries via Bit-Precise Symbolic Loop Mapping
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Cryptographic Function • Encryption and decryption procedure
- 3 Crypto Functions in Malware
- 4 Why Detect Crypto Functions? • Provide a starting point for reverse engineering
- 5 Crypto Function Attributes
- 6 Existing Detection Methods
- 7 Challenges
- 8 Our Method
- 9 Overview * Equivalence check on loop bodies in the
- 10 Loop Detection
- 11 Bit Symbolic Execution
- 12 Equivalence Checking • Replace the mapped input variables with new
- 13 Evaluation
- 14 Summary