Artwork

Indhold leveret af Black Hat/ CMP Media, Inc. and Jeff Moss. Alt podcastindhold inklusive episoder, grafik og podcastbeskrivelser uploades og leveres direkte af Black Hat/ CMP Media, Inc. and Jeff Moss eller deres podcastplatformspartner. Hvis du mener, at nogen bruger dit ophavsretligt beskyttede værk uden din tilladelse, kan du følge processen beskrevet her https://da.player.fm/legal.
Player FM - Podcast-app
Gå offline med appen Player FM !

Paul Vincent Sabanal: Reversing C++

52:59
 
Del
 

Manage episode 153226755 series 1085097
Indhold leveret af Black Hat/ CMP Media, Inc. and Jeff Moss. Alt podcastindhold inklusive episoder, grafik og podcastbeskrivelser uploades og leveres direkte af Black Hat/ CMP Media, Inc. and Jeff Moss eller deres podcastplatformspartner. Hvis du mener, at nogen bruger dit ophavsretligt beskyttede værk uden din tilladelse, kan du følge processen beskrevet her https://da.player.fm/legal.
As recent as a couple of years ago, reverse engineers can get by with just knowledge of C and assembly to reverse most applications. Now, due to the increasing use of C++ in malware as well as most moderns applications being written in C++, understanding the disassembly of C++ object oriented code is a must. This talk will attempt to fill that gap by discussing methods of manually identifying C++ concepts in the disassembly, how to automate the analysis, and tools we developed to enhance the disassembly based on the analysis done.
Paul Vincent Sabanal is a researcher with the IBM Internet Security Systems X-Force research team. Prior to joining IBM, Paul worked as an antivirus researcher at Trend Micro. Paul has spent most of his career doing malware reverse engineering, and has recently been delving into vulnerability research as well.
  continue reading

89 episoder

Artwork
iconDel
 
Manage episode 153226755 series 1085097
Indhold leveret af Black Hat/ CMP Media, Inc. and Jeff Moss. Alt podcastindhold inklusive episoder, grafik og podcastbeskrivelser uploades og leveres direkte af Black Hat/ CMP Media, Inc. and Jeff Moss eller deres podcastplatformspartner. Hvis du mener, at nogen bruger dit ophavsretligt beskyttede værk uden din tilladelse, kan du følge processen beskrevet her https://da.player.fm/legal.
As recent as a couple of years ago, reverse engineers can get by with just knowledge of C and assembly to reverse most applications. Now, due to the increasing use of C++ in malware as well as most moderns applications being written in C++, understanding the disassembly of C++ object oriented code is a must. This talk will attempt to fill that gap by discussing methods of manually identifying C++ concepts in the disassembly, how to automate the analysis, and tools we developed to enhance the disassembly based on the analysis done.
Paul Vincent Sabanal is a researcher with the IBM Internet Security Systems X-Force research team. Prior to joining IBM, Paul worked as an antivirus researcher at Trend Micro. Paul has spent most of his career doing malware reverse engineering, and has recently been delving into vulnerability research as well.
  continue reading

89 episoder

Alla avsnitt

×
 
Loading …

Velkommen til Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Hurtig referencevejledning