Creating Code Obfuscation Virtual Machines (Recon 2008)
Author:Craig Smith
Author website:
http://labs.neohapsis.com/
Explanation of what a virtual machine is and how they are used. It focuses on embedded virtual machines used for code obfuscation. Specific coding examples are provided on how to write your own opcode interpreter. Code samples on how to embed your newly created VM into a C application is also provided. Additional obfuscation techniques for the VM are discussed and even though this is a 101 course a solid understanding of x86 assembler is required.
This is the video of the presentation titled "Creating Code Obfuscation Virtual Machines" given by Craig Smith at Recon 2008.
This is the VM Creation 101 talk. The talk details what a virtual machine is and how they are used. It focuses on embedded virtual machines used for code obfuscation. Specific coding examples are provided on how to write your own opcode interpreter. Code samples on how to embed your newly created VM into a C application is also provided. Additional obfuscation techniques for the VM are discussed and even though this is a 101 course a solid understanding of x86 assembler is required.
You can download a high resolution version of the video here. The slides for the presentation are here.
http://www.securitytube.net/Creating-Code-Obfuscation-Virtual-Machines-(Recon-2008)-video.aspx
http://www.recon.cx/2008/a/craig_smith/Neohapsis-VM-101.pdf
http://www.archive.org/download/RECON2008/RECON2008-T08-Craig_Smith-Creating_Code_Obfuscation_Virtual_Machines.avi 虚拟机技术、 tx for u share~
页:
[1]