First Page | Document Content | |
---|---|---|
Date: 2015-05-28 15:51:40EXE packers Debuggers Interactive Disassembler Obfuscation Source code Computer security Disassembler UPX Obfuscated code Computer programming Computing Software engineering | Attacking Obfuscated Code with IDA Pro Chris EagleAdd to Reading ListSource URL: www.blackhat.comDownload Document from Source WebsiteFile Size: 535,54 KBShare Document on Facebook |
Attacking Obfuscated Code with IDA Pro Chris EagleDocID: 18pND - View Document | |
A Security Microcosm Attacking and Defending Shiva Shiva written by Neel Mehta and Shaun Clowes Presented by Shaun ClowesDocID: 15pdm - View Document | |
Strike/Counter-Strike: Reverse Engineering Shiva Chris Eagle Naval Postgraduate School OutlineDocID: 135s9 - View Document | |
Renovo: A Hidden Code Extractor for Packed Executables Min Gyung Kang, Pongsin Poosankam, and Heng Yin ∗ Carnegie Mellon UniversityDocID: 11VI3 - View Document | |
SoK: Deep Packer Inspection: A Longitudinal Study of the Complexity of Run-Time Packers Xabier Ugarte-Pedrero∗ , Davide Balzarotti† , Igor Santos∗ , Pablo G. Bringas∗ ∗ DeustoTech, University of DeustoDocID: 11Jms - View Document |