Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

API Deobfuscator - Identifying Runtime-Obfuscated API Calls Via Memory Access Analysis

Black Hat via YouTube

Overview

Explore an innovative approach to API deobfuscation in this 27-minute Black Hat conference talk. Delve into a resilient method based on memory access analysis that overcomes the limitations of traditional pattern-based techniques for identifying runtime-obfuscated API calls. Learn how this approach utilizes the memory access patterns of runtime-obfuscation techniques, particularly those used by advanced obfuscators like Themida. Discover how the presented API deobfuscator tracks memory accesses using Intel Pin, executes Themida packed binary files, and restores obfuscated API function calls to their original form. Gain insights into the process of constructing a map from API functions to obfuscated function addresses and how this map is used to identify original API functions. Understand the advantages of this method in reversing engineering efforts and its compatibility with common debuggers like Ollydbg.

Syllabus

API Deobfuscator: Identifying Runtime - Obfuscated API Calls Via Memory Access Analysis

Taught by

Black Hat

Reviews

Start your review of API Deobfuscator - Identifying Runtime-Obfuscated API Calls Via Memory Access Analysis

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.