A Mixed Boolean-Arithmetic (MBA) expression is composed of both integer arithmetic and bitwise operators. Such expressions can be leveraged to obfuscate the data-flow of code by iteratively applying rewrite rules and function identities, complicating its syntax while preserving its semantic behavior. This possibility is motivated by the fact that combinations of operators from these different […]
Category Archives: Workshop
Dissecting and Comparing Different Binaries to Malware Analysis
Demonstration of different kinds of structures in the binaries as a PE (header and your sessions), ELF (header and your sessions), PDF (header/ body/cross-reference table/trailer), explaining how each session works within a binary, techniques used such as packers, obfuscation with JavaScript (PDF) and more. Filipi will also explain some anti-disassembly techniques, demonstrating the action of […]
HTTP Request Smuggling
HTTP request smuggling is difficult to understand (payloads can be confusing at first sight) and the exploitation is no different. What better way to understand this trending new vulnerability than by seeing it from an attacker perspective. It will be an overview of the latest research on the topic. Load balancers and proxies, such as […]