Date | Day | Time | Duration |
22 Aug | Monday | 0900-17:00 SGT/GMT +8 | 8 Hours – Presentations & Hands-on exercises |
23 Aug | Tuesday | 0900-17:00 SGT/GMT +8 | 8 Hours – Presentations & Hands-on exercises |
24 Aug | Wednesday | 0900-17:00 SGT/GMT +8 | 8 Hours – Presentations & Hands-on exercises |
25 Aug | Thursday | 0900-17:00 SGT/GMT +8 | 8 Hours – Presentations & Hands-on exercises |
An Analytical approach to Modern Binary Deobfuscation is a curated training that provides an intensive jump-start into the field of code (de)obfuscation. Over the course of this training, students will receive a comprehensive introduction to the most relevant software obfuscation mechanisms as well as existing deobfuscation techniques to analyze, confront and defeat obfuscated code.
Live classes are designed to be dynamic and engaging, making the students get the most out of the training materials and instructor expertise. A clear presentation of the concepts, accompanied by illustrative examples and demos. For each section, there will be practice time allocated. The students will be provided with several exercises and projects to work on, with the continuous support of the instructor.
Day 1
Exercises
Project – Manually craft a custom obfuscation VM
Day 2
Exercises
Project – Applied MBA to obfuscate the semantics of VM-handlers
Day 3
Guided project – Build your own (toy) symbolic execution engine
Exercises
Project – Attack obfuscated VM and explore symbolic execution limits
Day 4
Guided project – Build your own code semantics synthesizer
Exercises
Project – Recover the semantics of MBA-obfuscated VM-handlers
This is a curated training that provides an intensive jump-start into the field of code (de)obfuscation. Over the course of this training, students will receive a comprehensive introduction to the most relevant software obfuscation mechanisms as well as existing deobfuscation techniques to analyze, confront and defeat obfuscated code.
Catalan hacker, reverse engineer and mathematician, with an extensive background in code (de)obfuscation research and Mixed Boolean-Arithmetic expressions, as well as industry experience as a malware analyst and security engineer. Founder of Fura Labs, a research and education firm on software security and reverse engineering. Co-founder and president of Hacking Lliure, a non-profit association and hacking community. Speaker and trainer at several international security conferences.
What students say about his training:
Duncan Ogilvie, author of x64dbg (@mrexodia)
“The lectures by Arnau on Mixed Boolean-Arithmetic obfuscation and deobfuscation techniques went very deep, while staying accessible for people without a formal math background. The exercise materials and projects were engaging and a natural practical extension of the theory discussed during the lectures. Arnau was also very responsive and happy to discuss ideas in the Discord channel. Overall a superb experience and I highly recommend you attend one of his trainings!”
Would you recommend this class, or attend other classes by this trainer?
“Yes, recommended.”
“Yes, he is one of the few experts in this area of research. Thus, his insights are invaluable.”
“Yes, highly recommended to people who are interested to understand the finer implementations of how Symbolic Execution or Mixed-Boolean Arithmetic works”
“The instructor focused more on the underlying theories of how each topics work rather than focusing on specific tools. This allows us to apply the knowledge to other tools.”