Binary and Malware Analysis

Table of Contents

Dynamic data excavation

Data is apparently unstructured, but usage isn’t.

Track pointers – root pointers, track how pointers derive from each other.

For arrays, look for loop accessing.

Type resolution points:

Data-flow tracking

BinArmor

Can protect legacy binaries.