Trolling Reverse-Engineers w/Math

Presented at THOTCON 0x1 (2010), April 23, 2010, 1:10 p.m. (20 minutes)

Did you ever sit around in your trigonometry class in high school wondering why you were learning anything about sinewaves or why they were even useful enough to warrant learning to begin with? Math is actually /pretty goddamn cool/. It may be irritating to solve for Y in all those formulas consisting of variable-salad, but solving for Y can be helpful in the world of binary obfuscation. This talk will attempt to teach a few techniques that will allow for the application of arbitrary mathematical formulas (such as sinewaves) to create unique, polymorphic sequences of assembly code. The weakness, strengths, pitfalls of assembly intricacies and potential implementations of such obfuscation techniques will also be covered.


Presenters:

  • Sean Taylor / Frank^2 as Frank^2
    frank^2 is a bottom-feeding script-kiddie who has made numerous attempts at performing DDoS attacks with WinNuke. Frequently, he can be seen working Santa Monica Boulevard, informing everyone he walks by of the services he'll provide and attempting hard-sells by informing people of the cheeseburgers he's got. He uses this coke-addled income to purchase Rbot herds, gathering infected nodes like an over-hyped hip-hop artist gathers bling. (The inability to do anything useful with said bling also applies.)

Links:

Similar Presentations: