malrev/ABD

malrev/ABD

This repository contains the course materials of Advanced Binary Deobfuscation at the Global Cybersecurity Camp (GCC) Tokyo in 2020.


Course Abstract


Reverse engineering is not easy, especially if a binary code is obfuscated. Once obfuscation performed, the binary would not be analyzed accurately with naive techniques alone. In this course, you will learn obfuscation principles (especially used by malware), theory and practice of obfuscated code analysis, and how to write your own tool for deobfuscation. In particular, we delve into data-flow analysis and SAT/SMT-based binary analysis (e.g., symbolic execution) to render obfuscation ineffective.


Outline


This course is about binary deobfuscation, meant for security analysts and researchers (in embryo) looking to add a skill set on writing your own tool to their arsenal. At the end of this class, attendees will be able to:


  • Have an in-depth understanding of theory, practice, and behind insights of obfuscation

  • Build a custom obfuscated payload with state-of-the-art packers

  • Apply compiler optimization techniques to binary analysis tasks

  • Design and implement automated binary analysis tools top on a symbolic execution engine

  • Even analyze obfuscated malware used in the APT campaign

  • Towards this end, the course was held in the form of a combination of classroom learning and hands-on training at GCC.


    Prerequisite Knowledge


    Attendees should have:


  • Robust skill set in x86/x64 architecture

  • ..

    Support the originator by clicking the read the rest link below.