Media Summary: Speaker: Tim Blazytko Conference: r2con2021 URL: Code and slides: ... Our talk first gives an overview of contemporary code by Seokwoo Choi API wrapping technique is commonly used among malwares and code obfuscators. One of the advanced API ...

Analysis Of Virtualization Based Obfuscation R2con2021workshop - Detailed Analysis & Overview

Speaker: Tim Blazytko Conference: r2con2021 URL: Code and slides: ... Our talk first gives an overview of contemporary code by Seokwoo Choi API wrapping technique is commonly used among malwares and code obfuscators. One of the advanced API ... [r2con2021:3/3] by Fernando Dominguez Porting the diaphora binary diffing tool to leveraging it to perform code similarity Wslink is a unique loader, linked to the Lazarus group, that we documented at the end of the last year for the first time. Most of the ... Android applications are becoming more and more

This video presents my conference paper on We present a verifiable method to address the challenge of partially- Virtual machines are often touted as a safe haven for experimenting with software, but what if those sandboxes aren't as secure as ...

Photo Gallery

Analysis of Virtualization-based Obfuscation (r2con2021workshop)
Recon 2022 - The Next Generation of Virtualization based Obfuscators
#HITB2023AMS D1T2 - Next Generation Virtualization-Based Obfuscators - T. Blazytko & M. Schloegel
Greybox Program Synthesis: A New Approach to Attack Dataflow Obfuscation
API Deobfuscator: Identifying Runtime - Obfuscated API Calls Via Memory Access Analysis
Virtualization Explained
[r2con2021] Code Similarity Analysis with r2 and Diaphora
Recon 2022 - Under the hood of wlink multilayered virtual machine
Dynamic Binary Instrumentation Techniques to Address Native Code Obfuscation
AICTC Conference Paper Presentation: Obfuscation Detection in Drone APKs using Static Analysis
Recon 2022 - Under the hood of Wslink multilayered virtual machine
VMHunt: A Verifiable Approach to Partially-Virtualized Binary Code Simplification
View Detailed Profile
Analysis of Virtualization-based Obfuscation (r2con2021workshop)

Analysis of Virtualization-based Obfuscation (r2con2021workshop)

Speaker: Tim Blazytko Conference: r2con2021 URL: https://rada.re/con/2021/ Code and slides: ...

Recon 2022 - The Next Generation of Virtualization based Obfuscators

Recon 2022 - The Next Generation of Virtualization based Obfuscators

Our talk first gives an overview of contemporary code

#HITB2023AMS D1T2 - Next Generation Virtualization-Based Obfuscators - T. Blazytko & M. Schloegel

#HITB2023AMS D1T2 - Next Generation Virtualization-Based Obfuscators - T. Blazytko & M. Schloegel

Code

Greybox Program Synthesis: A New Approach to Attack Dataflow Obfuscation

Greybox Program Synthesis: A New Approach to Attack Dataflow Obfuscation

Obfuscation

API Deobfuscator: Identifying Runtime - Obfuscated API Calls Via Memory Access Analysis

API Deobfuscator: Identifying Runtime - Obfuscated API Calls Via Memory Access Analysis

by Seokwoo Choi API wrapping technique is commonly used among malwares and code obfuscators. One of the advanced API ...

Virtualization Explained

Virtualization Explained

Check out this

[r2con2021] Code Similarity Analysis with r2 and Diaphora

[r2con2021] Code Similarity Analysis with r2 and Diaphora

[r2con2021:3/3] by Fernando Dominguez Porting the diaphora binary diffing tool to leveraging it to perform code similarity

Recon 2022 - Under the hood of wlink multilayered virtual machine

Recon 2022 - Under the hood of wlink multilayered virtual machine

Wslink is a unique loader, linked to the Lazarus group, that we documented at the end of the last year for the first time. Most of the ...

Dynamic Binary Instrumentation Techniques to Address Native Code Obfuscation

Dynamic Binary Instrumentation Techniques to Address Native Code Obfuscation

Android applications are becoming more and more

AICTC Conference Paper Presentation: Obfuscation Detection in Drone APKs using Static Analysis

AICTC Conference Paper Presentation: Obfuscation Detection in Drone APKs using Static Analysis

This video presents my conference paper on

Recon 2022 - Under the hood of Wslink multilayered virtual machine

Recon 2022 - Under the hood of Wslink multilayered virtual machine

Wslink is a unique loader, linked to the Lazarus group, that we documented at the end of the last year for the first time. Most of the ...

VMHunt: A Verifiable Approach to Partially-Virtualized Binary Code Simplification

VMHunt: A Verifiable Approach to Partially-Virtualized Binary Code Simplification

We present a verifiable method to address the challenge of partially-

Are Virtual Machines Really Safe  The Shocking Truth About VM Exploits

Are Virtual Machines Really Safe The Shocking Truth About VM Exploits

Virtual machines are often touted as a safe haven for experimenting with software, but what if those sandboxes aren't as secure as ...

[r2con2021] Code Similarity Analysis with r2 and Diaphora

[r2con2021] Code Similarity Analysis with r2 and Diaphora

[r2con2021:3/3] by Fernando Dominguez Porting the diaphora binary diffing tool to leveraging it to perform code similarity