| # | Topic | Readings | References |
|---|---|---|---|
| intro-1 | Introduction | ||
| model-1 | Modeling Attacks and Defenses | ||
| misc-1 | Miscellaneous Tools and Techniques |
|
| # | Topic | Readings | References |
|---|---|---|---|
| X86-1 | X86 Instruction Set | ||
| x86-2 | X86 Control Flow Instructions | ||
| x86-3 | X86 Data Movement Instructions | ||
| x86-4 | X86 Calling Conventions | ||
| x86-5 | X86 Instruction Encoding |
| # | Topic | Readings | References |
|---|---|---|---|
| ast-1 | Abstract Syntax Trees |
| |
| cfg-1 | Control Flow Analysis | ||
| file-1 | Executable File Formats |
|
|
| disass-1 | Disassembly |
|
|
| # | Topic | Readings | Referenes |
|---|---|---|---|
| gdb-1 | Debugging with gdb |
| |
| trace-1 | Tracing |
| |
| symex-1 | Symbolic Execution |
|
|
| symex-2 | Symbolic Execution with angr |
|
|
| # | Topic | Readings | References |
|---|---|---|---|
| ghidra-1 | Introduction to Ghidra |
| |
| ghidra-2 | Introduction to Ghidra 2 |
|
|
| ghidra-3 | Ghidra Code Patching |
|
|
| ghidra-4 | Ghidra Scripting |
|
|
| # | Topic | Readings | References |
|---|---|---|---|
| virt-1 | Virtualization Obfuscation | ||
| virt-2 | Protecting Virtualized Code | ||
| checksum-1 | Checksum Integrity Check | ||
| arith-1 | Encoding Integer Expressions | ||
| flatten-1 | Control Flow Flattening | ||
| checksum-2 | Checksum Attacks and Defenses | ||
| softprot-1 | Software Protection | ||
| opaque-1 | Opaque Expressions |