/r/ReverseEngineering's Weekly Questions Thread Reverse Engineering |
- /r/ReverseEngineering's Weekly Questions Thread
- [PDF] Symbolic Deobfuscation: From Virtualized Code Back to the Original
- GitHub - airbus-seclab/cpu_rec: Recognize cpu instructions in an arbitrary binary file
- Breaking ledgerctf's AES white-box challenge
- Play Acorn Archimedes games natively on Raspberry Pi with RISC OS thanks to similar ARM CPU architecture and efforts of Archimedes Software Preservation Project
- ELISA: ELiciting ISA of Raw Binaries for Fine-grained Code and Data Separation
- Extended Abstract: Toward Systematically Exploring Antivirus Engines
/r/ReverseEngineering's Weekly Questions Thread Posted: 29 Jun 2018 08:08 AM PDT To reduce the amount of noise from questions, we have disabled self-posts in favor of a unified questions thread every other week. Feel free to ask any question about reverse engineering here. If your question is about how to use a specific tool, or is specific to some particular target, you will have better luck on the Reverse Engineering StackExchange. [link] [comments] |
[PDF] Symbolic Deobfuscation: From Virtualized Code Back to the Original Posted: 29 Jun 2018 10:08 AM PDT |
GitHub - airbus-seclab/cpu_rec: Recognize cpu instructions in an arbitrary binary file Posted: 29 Jun 2018 10:53 AM PDT |
Breaking ledgerctf's AES white-box challenge Posted: 29 Jun 2018 12:38 AM PDT |
Posted: 29 Jun 2018 03:29 AM PDT |
ELISA: ELiciting ISA of Raw Binaries for Fine-grained Code and Data Separation Posted: 29 Jun 2018 10:51 AM PDT |
Extended Abstract: Toward Systematically Exploring Antivirus Engines Posted: 29 Jun 2018 10:50 AM PDT |
You are subscribed to email updates from Reverse Engineering. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment