Lead AI-Native Products with Microsoft's Agentic AI Program
Live Online Classes in Design, Coding & AI — Small Classes, Free Retakes
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Learn to defeat sophisticated .NET malware obfuscation techniques using profiler-based dynamic binary instrumentation in this conference talk from Recon 2025. Discover how traditional static deobfuscation methods fail against modern protections that include runtime integrity checks, and explore a revolutionary framework that leverages .NET profilers to perform dynamic binary instrumentation at the MSIL level. Master techniques to bypass dynamic checks in obfuscation schemes, extract encrypted strings, and trace execution flows without modifying the original binary. Examine real-world case studies demonstrating how this approach overcomes the limitations of conventional analysis methods when dealing with obfuscated .NET malware. Gain practical insights through live demonstrations showing how reverse engineers can apply this powerful new methodology to analyze increasingly sophisticated malware that exploits .NET's development ease and stability while employing advanced obfuscation to evade detection.
Syllabus
Recon 2025 - Breaking Obfuscated .NET Malware with Profiler Based Dynamic Binary Instrumentation
Taught by
Recon Conference