Obfuscation

Posts tagged: "Obfuscation"

Theodosius - Jit linker, Symbol Mapper, and Obfuscator

Existing software protection frameworks typically operate at a small range of compilation levels. The highest level of obfuscation typically operates upon source code directly (source2source), the second highest level is LLVM IR (via optimization passes), and the third and final most common is upon the native binary image (bin2bin).

_xeroxz
_xeroxz
May 06, 2022 | 27 min read
Obfuscation

Writing a Mutation Engine and breaking Aimware

PERSES is a X86 code obfuscation engine that works with Portable Executable files. The obfuscation works by replacing a specific instruction with a larger more sophisticated set that is semantically compatible to the original.

x86mike
x86mike
Apr 13, 2022 | 20 min read
Obfuscation

VMProtect 2 - Part Two, Complete Static Analysis

The purpose of this article is to expound upon the prior work disclosed in the last article titled, VMProtect 2 - Detailed Analysis of the Virtual Machine Architecture, as well as correct a few mistakes. In addition, this post will focus primarily on the creation of static analysis tools using the knowledge disclosed in the prior post...

_xeroxz
_xeroxz
Jun 21, 2021 | 26 min read
VMProtect-2 Obfuscation

VMProtect 2 - Detailed Analysis of the Virtual Machine Architecture

VMProtect 2 is a virtual machine based x86 obfuscator which converts x86 instructions to a RISC, stack machine, instruction set. Each protected binary has a unique set of encrypted virtual machine instructions with unique obfuscation. This project aims to disclose very significant signatures which are in every single VMProtect 2 binary with the intent to aid in further research...

_xeroxz
_xeroxz
May 17, 2021 | 57 min read
VMProtect-2 Obfuscation