RT @binitamshah: Tigress - A C Obfuscation Tool : http://goo.gl/oaJXIK
-
-
Replying to @jedisct1
@jedisct1@binitamshah Considering how much time I've spent reverse engineering obfuscated code, interesting to see the other side.1 reply 0 retweets 0 likes -
Replying to @hyc_symas
@hyc_symas@binitamshah I guess you know about https://github.com/obfuscator-llvm/obfuscator/wiki …1 reply 0 retweets 1 like -
Replying to @jedisct1
@jedisct1@binitamshah This sort of thing is trivially defeated by bitblaze http://bitblaze.cs.berkeley.edu/temu.html1 reply 0 retweets 0 likes -
Replying to @hyc_symas
@jedisct1@binitamshah I've also used a custom module for valgrind to track data flows for similar results.1 reply 0 retweets 0 likes -
Replying to @hyc_symas
@jedisct1@binitamshah Ultimately I wish the obfuscators would just FOAD. Their code eats CPU, RAM, and power and is inherently anti-user.1 reply 0 retweets 0 likes -
Replying to @hyc_symas
@jedisct1@binitamshah ... as if we don't already have enough problems with software bloat to begin with...1 reply 0 retweets 0 likes -
Replying to @hyc_symas
@jedisct1@binitamshah Some of the virtualization in Tigress looks new to me. Funny to use a VM to unravel a VM. Inception...1 reply 0 retweets 0 likes -
Replying to @hyc_symas
@jedisct1@binitamshah randomization, anti-debugger tricks, all useless when running inside a VM. We control clock, "entropy", etc.2 replies 0 retweets 0 likes
@hyc_symas That’s why you also need VM detection techniques.
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.