Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Breaking Obfuscated .NET Malware with Profiler Based Dynamic Binary Instrumentation

Recon Conference via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn to defeat sophisticated .NET malware obfuscation techniques using profiler-based dynamic binary instrumentation in this conference talk from Recon 2025. Discover how traditional static deobfuscation methods fail against modern protections that include runtime integrity checks, and explore a revolutionary framework that leverages .NET profilers to perform dynamic binary instrumentation at the MSIL level. Master techniques to bypass dynamic checks in obfuscation schemes, extract encrypted strings, and trace execution flows without modifying the original binary. Examine real-world case studies demonstrating how this approach overcomes the limitations of conventional analysis methods when dealing with obfuscated .NET malware. Gain practical insights through live demonstrations showing how reverse engineers can apply this powerful new methodology to analyze increasingly sophisticated malware that exploits .NET's development ease and stability while employing advanced obfuscation to evade detection.

Syllabus

Recon 2025 - Breaking Obfuscated .NET Malware with Profiler Based Dynamic Binary Instrumentation

Taught by

Recon Conference

Reviews

Start your review of Breaking Obfuscated .NET Malware with Profiler Based Dynamic Binary Instrumentation

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.