This is a curated training that provides an intensive jump-start into the field of code (de)obfuscation. Over the course of this training, students will receive a comprehensive introduction to the most relevant software obfuscation mechanisms as well as existing deobfuscation techniques to analyze, confront and defeat obfuscated code.
$4,299.00
Date | Day | Time | Duration |
22 Aug | Monday | 0900-17:00 SGT/GMT +8 | 8 Hours โ Presentations & Hands-on exercises |
23 Aug | Tuesday | 0900-17:00 SGT/GMT +8 | 8 Hours โ Presentations & Hands-on exercises |
24 Aug | Wednesday | 0900-17:00 SGT/GMT +8 | 8 Hours โ Presentations & Hands-on exercises |
25 Aug | Thursday | 0900-17:00 SGT/GMT +8 | 8 Hours โ Presentations & Hands-on exercises |
An Analytical approach to Modern Binary Deobfuscationย is a curated training that provides an intensive jump-start into the field of code (de)obfuscation. Over the course of this training, students will receive a comprehensive introduction to the most relevant software obfuscation mechanisms as well as existing deobfuscation techniques to analyze, confront and defeat obfuscated code.
Live classes are designed to be dynamic and engaging, making the students get the most out of the training materials and instructor expertise. A clear presentation of the concepts, accompanied by illustrative examples and demos. For each section, there will be practice time allocated. The students will be provided with several exercises and projects to work on, with the continuous support of the instructor.
Day 1
Exercises
Project – Manually craft a custom obfuscation VM
Day 2
Exercises
Project – Applied MBA to obfuscate the semantics of VM-handlers
Day 3
Guided project – Build your own (toy) symbolic execution engine
Exercises
Project – Attack obfuscated VM and explore symbolic execution limits
Day 4
Guided project – Build your own code semantics synthesizer
Exercises
Project – Recover the semantics of MBA-obfuscated VM-handlers
Mr. Gal Diskin is a cybersecurity and AI researcher. He was previously the VP & head of Palo Alto Networks’ Israeli site, and is a serial entrepreneur. Mr. Diskin’s research has been featured in HITB, Defcon, Black Hat, CCC, and other conferences, spanning fields from low level security research such as hardware vulnerabilities, binary instrumentation, and car hacking to high level research on AI detection methods, Enterprise security, and Identity security. Mr. Diskin was also the technical lead and co-founder of Intel’s software security organization, as well as the CTO of Cyvera and HeXponent (co-founder) before their acquisition.
Huajiang โKevin2600โ Chen (Twitter: @kevin2600) is a senior security researcher. He mainly focuses on vulnerability research in wireless and Vehicle security. He is a winner of GeekPwn 2020 and also made to the Tesla hall of fame 2021. Kevin2600 has spoken at various conferences including KCON; DEFCON and CANSECWEST.
This is a curated training that provides an intensive jump-start into the field of code (de)obfuscation. Over the course of this training, students will receive a comprehensive introduction to the most relevant software obfuscation mechanisms as well as existing deobfuscation techniques to analyze, confront and defeat obfuscated code.
intercontinental singapore
follow us