# | Topic | Readings | References |
---|---|---|---|
intro-1 | Introduction |
| |
model-1 | Modeling Attacks and Defenses |
# | Topic | Readings | References |
---|---|---|---|
X86-1 | X86 Instruction Set | ||
x86-2 | X86 Control Flow Instructions |
| |
x86-3 | X86 Data Movement Instructions | ||
x86-4 | X86 Calling Conventions |
| |
x86-5 | X86 Instruction Encoding |
# | Topic | Readings | References |
---|---|---|---|
ast-1 | Abstract Syntax Trees |
| |
cfg-1 | Control Flow Analysis |
| |
file-1 | Executable File Formats |
|
|
disass-1 | Disassembly |
|
|
# | Topic | Readings | Referenes |
---|---|---|---|
gdb-1 | Debugging with gdb |
| |
trace-1 | Tracing |
| |
symex-1 | Symbolic Execution |
|
|
symex-2 | Symbolic Execution with angr |
|
|
# | Topic | Readings | References |
---|---|---|---|
ghidra-1 | Introduction to Ghidra | ||
ghidra-2 | Introduction to Ghidra 2 | ||
ghidra-3 | Ghidra Code Patching | ||
ghidra-4 | Ghidra Scripting |
# | Topic | Readings | References |
---|---|---|---|
virt-1 | Virtualization Obfuscation | ||
virt-2 | Protecting Virtualized Code | ||
checksum-1 | Checksum Integrity Check | ||
arith-1 | Encoding Integer Expressions | ||
flatten-1 | Control Flow Flattening | ||
checksum-2 | Checksum Attacks and Defenses | ||
softprot-1 | Software Protection | ||
opaque-1 | Opaque Expressions |