# | Topic | Readings | References |
---|---|---|---|
intro-1 | Introduction | ||
model-1 | Modeling Attacks and Defenses | ||
misc-1 | Miscellaneous Tools and Techniques |
|
# | Topic | Readings | References |
---|---|---|---|
X86-1 | X86 Instruction Set | ||
x86-2 | X86 Control Flow Instructions | ||
x86-3 | X86 Data Movement Instructions | ||
x86-4 | X86 Calling Conventions | ||
x86-5 | X86 Instruction Encoding |
# | Topic | Readings | References |
---|---|---|---|
ast-1 | Abstract Syntax Trees |
| |
cfg-1 | Control Flow Analysis | ||
file-1 | Executable File Formats |
|
|
disass-1 | Disassembly |
|
|
# | Topic | Readings | Referenes |
---|---|---|---|
gdb-1 | Debugging with gdb |
| |
trace-1 | Tracing |
| |
symex-1 | Symbolic Execution |
|
|
symex-2 | Symbolic Execution with angr |
|
|
# | Topic | Readings | References |
---|---|---|---|
ghidra-1 | Introduction to Ghidra |
| |
ghidra-2 | Introduction to Ghidra 2 |
|
|
ghidra-3 | Ghidra Code Patching |
|
|
ghidra-4 | Ghidra Scripting |
|
|
# | Topic | Readings | References |
---|---|---|---|
virt-1 | Virtualization Obfuscation | ||
virt-2 | Protecting Virtualized Code | ||
checksum-1 | Checksum Integrity Check | ||
arith-1 | Encoding Integer Expressions | ||
flatten-1 | Control Flow Flattening | ||
checksum-2 | Checksum Attacks and Defenses | ||
softprot-1 | Software Protection | ||
opaque-1 | Opaque Expressions |