We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Emulation driven Reverse Engineering for Finding Vulns

Formale Metadaten

Titel
Emulation driven Reverse Engineering for Finding Vulns
Serientitel
Anzahl der Teile
85
Autor
Lizenz
CC-Namensnennung 3.0 Unported:
Sie dürfen das Werk bzw. den Inhalt zu jedem legalen Zweck nutzen, verändern und in unveränderter oder veränderter Form vervielfältigen, verbreiten und öffentlich zugänglich machen, sofern Sie den Namen des Autors/Rechteinhabers in der von ihm festgelegten Weise nennen.
Identifikatoren
Herausgeber
Erscheinungsjahr
Sprache

Inhaltliche Metadaten

Fachgebiet
Genre
Abstract
Do your eyes hurt? is your brain aching? is your pain caused from too much deciphering difficult assembly (or decompiled C) code? Assembly can hurt, C code can be worse. Partial emulation to the rescue! Let the emulator walk you through the code, let it answer hard questions/problems you run into in your reversing/vuln research. This talk will introduce you the power of emulator-driven reversing. guide your RE with the help of an emulator (one that can survive limited context), emulate code you don't want to reverse, be better, learn more, be faster, with less brain-drain. Make no mistake, RE will always have room for magicians to show their wizardry... but after this talk, you may find yourself a much more powerful wizard.