Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Next Generation Virtualization-Based Obfuscators

Hack In The Box Security Conference via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the cutting-edge world of code obfuscation in this 59-minute conference talk from the Hack In The Box Security Conference. Delve into an overview of contemporary code obfuscation schemes, focusing on the design and architecture of virtual machines. Examine the weaknesses of established approaches, including their reliance on fixed instruction set architectures and weak obfuscation of individual components. Learn about various deobfuscation attacks such as compiler optimizations, symbolic execution, and program synthesis, and understand how they can efficiently deobfuscate VM components and reconstruct protected code. Discover the core design principles behind next-generation virtual machines and how they aim to counter these attacks. Investigate concrete methods for generating target-specific instruction set architectures and intertwined VM components, and understand their synergistic effects in withstanding specific attacks. Gain insights into how these techniques will shape the landscape of modern obfuscation in the coming years and the necessary advancements in code deobfuscation research to tackle these advanced virtual machines.

Syllabus

#HITB2023AMS D1T2 - Next Generation Virtualization-Based Obfuscators - T. Blazytko & M. Schloegel

Taught by

Hack In The Box Security Conference

Reviews

Start your review of Next Generation Virtualization-Based Obfuscators

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.