We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Emulation driven Reverse Engineering for Finding Vulns

Formal Metadata

Title
Emulation driven Reverse Engineering for Finding Vulns
Title of Series
Number of Parts
85
Author
License
CC Attribution 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
Do your eyes hurt? is your brain aching? is your pain caused from too much deciphering difficult assembly (or decompiled C) code? Assembly can hurt, C code can be worse. Partial emulation to the rescue! Let the emulator walk you through the code, let it answer hard questions/problems you run into in your reversing/vuln research. This talk will introduce you the power of emulator-driven reversing. guide your RE with the help of an emulator (one that can survive limited context), emulate code you don't want to reverse, be better, learn more, be faster, with less brain-drain. Make no mistake, RE will always have room for magicians to show their wizardry... but after this talk, you may find yourself a much more powerful wizard.