Binary and Malware Analysis

List all lecture notes.

My homepage.

Binary and Malware Analysis

  1. Introduction
  2. Assembly
  3. What happens before main()
  4. GDB
  5. Anti-analysis
  6. Disassembly tools
  7. Packers
  8. Dynamic Binary Instrumentation & Intel Pin
  9. Dynamic taint analysis
  10. Taint analysis in practice
  11. Dynamic data excavation
  12. Tracking control flow
  13. Mitigating code reuse attacks (TypeArmor)
  14. Parser identification
  15. Symbolic execution