Overview
Explore reverse engineering techniques in this comprehensive conference talk from OISF 2013. Delve into topics such as source code analysis, binary disassembly, decompilation, and blackbox analysis. Learn about vulnerability discovery, static and dynamic approaches, and obstacles like anti-debugging and virtualization obfuscation. Gain insights into where to apply reverse engineering and understand the importance of tools beyond integrated development environments (IDEs). Discover techniques for handling string analysis and state machines in the context of reverse engineering.
Syllabus
Intro
Disclaimer
Outline
Scope
Why Reverse Engineering
Source Code
Binary
Disassemblyrs
Table Lookup
Decompiler
IDE is not an analysis tool
Blackbox analysis
Where to apply it
Vulnerability discovery
Static and dynamic approaches
Obstacles
Disassembly
Antidebugging
Virtualizing obfuscs
VMProtect
State Machine
Strings