Stuck in Tutorial Hell? Learn Backend Dev the Right Way
UC San Diego Product Management Certificate — AI-Powered PM Training
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Explore reverse engineering techniques in this comprehensive conference talk from OISF 2013. Delve into topics such as source code analysis, binary disassembly, decompilation, and blackbox analysis. Learn about vulnerability discovery, static and dynamic approaches, and obstacles like anti-debugging and virtualization obfuscation. Gain insights into where to apply reverse engineering and understand the importance of tools beyond integrated development environments (IDEs). Discover techniques for handling string analysis and state machines in the context of reverse engineering.
Syllabus
Intro
Disclaimer
Outline
Scope
Why Reverse Engineering
Source Code
Binary
Disassemblyrs
Table Lookup
Decompiler
IDE is not an analysis tool
Blackbox analysis
Where to apply it
Vulnerability discovery
Static and dynamic approaches
Obstacles
Disassembly
Antidebugging
Virtualizing obfuscs
VMProtect
State Machine
Strings