Pushing Security Left by Mutating Byte Code

Pushing Security Left by Mutating Byte Code

nullcon via YouTube Direct link

Key Generation

14 of 16

14 of 16

Key Generation

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Pushing Security Left by Mutating Byte Code

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Agenda
  3. 3 Push Security Left
  4. 4 Debug Version
  5. 5 Constant Obfuscation
  6. 6 Cross Compilation
  7. 7 Binary
  8. 8 Debug
  9. 9 Theory
  10. 10 Encryption
  11. 11 Capture Memory
  12. 12 Testing
  13. 13 Limitations
  14. 14 Key Generation
  15. 15 Website
  16. 16 Questions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.