Rewriting x86 Binaries: Many PEs, Such Secure, Wow.

Presented at REcon 2014, June 29, 2014, 1 p.m. (60 minutes)

Binary code from untrusted sources remains one of the primary vehicles for software propagation and malicious software attacks. All previous work to mitigate such attacks requires code-producer cooperation, has significant deployment issues, or incurs a high performance penalty. The problem of accurate static x86 disassembly without metadata is provably undecidable, and is regarded by many as uncircumventable.


Presenters:

Links:

Similar Presentations: