Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Automated Unpacking and Deobfuscation of Nested VM-Based Protectors

DEFCONConference via YouTube

Overview

Coursera Spring Sale
40% Off Coursera Plus Annual!
Grab it
Learn to combat modern software protection techniques through an automated framework that tackles complex virtualization-based obfuscation in this DEF CON 33 conference talk. Discover how DragonSlayer combines symbolic execution with fine-grained dynamic taint tracking to systematically lift obfuscated bytecode from sophisticated protectors like VMProtect, Themida, and custom solutions that traditionally hinder static and dynamic analysis. Explore the methodology for precisely identifying VM handlers, recovering original instruction semantics, automatically unpacking multiple virtualization layers, and reconstructing analyzable representations of protected code. Examine real-world case studies demonstrating the framework's effectiveness against the latest commercial VM protectors and custom obfuscation solutions, showcasing how analysis time can be reduced from weeks to hours. Gain insights into technical deep-dives covering the approach's implementation, witness live demonstrations of the tooling in action, and understand how reverse engineers can leverage these techniques to overcome virtualization-based protection mechanisms that act as significant barriers in malware analysis and software reverse engineering.

Syllabus

DEF CON 33 - Automated Unpacking & Deobfuscation of Nested VM-Based Protectors - Agostino Panico

Taught by

DEFCONConference

Reviews

Start your review of Automated Unpacking and Deobfuscation of Nested VM-Based Protectors

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.