SMT in reverse engineering, for dummies
This is a re-recording of my lightning talk "SMT in reverse engineering, for dummies" which I presented at SEC-T 0x09 (www.sec-t.org) this September.
The talk introduces how SMT can be used in reverse engineering with the help of tools such as Z3 (z3.codeplex.com) and angr (angr.io).
The code I'm referring to in the presentation can be found on my website (zeta-two.com/education/2016/0...)
Пікірлер: 13
Thanks, very interesting
This was an incredible talk. Thanks so much for giving it.
@ZetaTwo
7 жыл бұрын
Thanks! Glad to hear you enjoyed it. Will hopefully create more in the future.
Great talk calle, enjoyed it both IRL and here, thanks for sharing!
@ZetaTwo
7 жыл бұрын
Dick Svensson Thanks! I'm considering doing a series of introductory videos on some topics in IT-security.
Thank you for the very informative content. Downloaded so I can rewatch a few times to grasp the topic.
Thanks Carl, great talk, interesting tools, thanks for sharing your method.
@ZetaTwo
4 жыл бұрын
Thanks! Glad that you enjoyed it!
Kul att det dök upp på min rekommendation så att säga... Tack för undervisningen gubben! 🙏
this applies to many fields e.g. cryptographic functions... ;)
@ZetaTwo
6 жыл бұрын
Dario Cangialosi Actually, any proper cryptographic function is completely immune to this kind of analysis. However some home baked solutions, for example the Petya malware was broken with methods like this.
if you type randomly you have 1 chance in 10 of succeeding it seems
@ZetaTwo
6 жыл бұрын
Yes, its exactly 1/10 chance since the algorithm just checks that the last digit matches the checksum. The point of the talk however, is not the specific algorithm but the general methodology used to analyze the problem.