Overview
Explore Swift code reversing techniques in this 17-minute conference talk from Objective-See Foundation's OBTS v7.0. Delve into the evolution of Swift since its 2014 introduction and understand why reverse engineers need proficiency in analyzing Swift-based code, particularly given its increasing adoption by malware authors. Learn to interpret Swift from a disassembly perspective, with special focus on critical types including Small and Large Strings, Arrays, Closures, and Objective C Bridging. Examine real-world examples through disassembled code from recent macOS malware written in Swift. Security Researcher Christopher Lopez from Kandji, known for his expertise in arm64 and reverse engineering, delivers practical insights for modern Swift code analysis.
Syllabus
#OBTS v7.0: "Swift Reversing in 2024 - It's Not So Bad :)" - Chris Lopez
Taught by
Objective-See Foundation