{"id":11730,"date":"2023-03-20T08:27:55","date_gmt":"2023-03-20T08:27:55","guid":{"rendered":"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/an-analytical-approach-to-modern-binary-deobfuscation-hitb2023hkt\/"},"modified":"2023-07-06T04:53:42","modified_gmt":"2023-07-06T04:53:42","slug":"an-analytical-approach-to-modern-binary-deobfuscation-hitb2023hkt","status":"publish","type":"product","link":"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/an-analytical-approach-to-modern-binary-deobfuscation-hitb2023hkt\/","title":{"rendered":"An Analytical Approach to Modern Binary Deobfuscation (HKT)"},"content":{"rendered":"<div class=\"page\" title=\"Page 3\">\n<div class=\"layoutArea\">\n<h4><strong><span style=\"color: #993300\">ATTEND ONLINE<\/span><\/strong><strong><span style=\"color: #993300\">: <\/span><\/strong><strong>Virtual via Zoom and Discord<\/strong><\/h4>\n<\/div>\n<\/div>\n<h4><strong>DATE: 21-24 August 2023<\/strong><\/h4>\n<h4><strong>TIME: 09:00 to 17:00 ICT\/GMT+7<\/strong><\/h4>\n<table style=\"height: 146px\" width=\"599\">\n<tbody>\n<tr>\n<td><strong>Date<\/strong><\/td>\n<td><strong>Day<\/strong><\/td>\n<td style=\"text-align: left\"><strong>Time<\/strong><\/td>\n<td><strong>Duration<\/strong><\/td>\n<\/tr>\n<tr>\n<td>21 Aug<\/td>\n<td>Monday<\/td>\n<td>0900-17:00 ICT\/GMT+7<\/td>\n<td>8 Hours<\/td>\n<\/tr>\n<tr>\n<td>22 Aug<\/td>\n<td>Tuesday<\/td>\n<td>0900-17:00 ICT\/GMT+7<\/td>\n<td>8 Hours<\/td>\n<\/tr>\n<tr>\n<td>23 Aug<\/td>\n<td>Wednesday<\/td>\n<td>0900-17:00 ICT\/GMT+7<\/td>\n<td>8 Hours<\/td>\n<\/tr>\n<tr>\n<td>24 Aug<\/td>\n<td>Thursday<\/td>\n<td>0900-17:00 ICT\/GMT+7<\/td>\n<td>8 Hours<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr \/>\n<h5>Code obfuscation has become one of the most prevalent mechanisms aiming to complicate the process of software reverse engineering. It plays a major role on a wide range of domains: from malware threats to protection of intellectual property and digital rights management.<\/h5>\n<p><em>An Analytical approach to Modern Binary Deobfuscation<\/em>\u00a0is a curated training that provides an intensive jump-start into the field of code (de)obfuscation. Over the course of this training, students will receive a comprehensive introduction to the most relevant software obfuscation mechanisms as well as existing deobfuscation techniques to analyze, confront and defeat obfuscated code.<\/p>\n<h5><\/h5>\n<h5><strong>Teaching Methodology<\/strong><\/h5>\n<p>Live classes are designed to be dynamic and engaging, making the students get the most out of the training materials and instructor expertise. A clear presentation of the concepts, accompanied by illustrative examples and demos. For each section, there will be practice time allocated. The students will be provided with several exercises and projects to work on, with the continuous support of the instructor.<\/p>\n<p>&nbsp;<\/p>\n<h5><strong>Key Learning Objectives<\/strong><\/h5>\n<ul>\n<li>Obtain a high-level overview of the context and scenarios where code obfuscation is used<\/li>\n<li>Gain an in-depth understanding of code obfuscation mechanisms<\/li>\n<li>Build obfuscated code, both from scratch and through available tooling<\/li>\n<li>Develop an understanding of the main code deobfuscation techniques<\/li>\n<li>Learn tooling for analyzing obfuscated code and apply deobfuscation techniques<\/li>\n<li>Become familiar with state of the art (de)obfuscation research literature<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h5 class=\"font-primary text-dark\"><strong>Students will be provided with<\/strong><\/h5>\n<ul class=\"pl-2\">\n<li>Access to a VM with all tools, examples and exercises<\/li>\n<li>Access to a private chat with instructor and other students<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h5><strong>Agenda<\/strong><\/h5>\n<hr \/>\n<p><strong>Day 1<\/strong><\/p>\n<hr \/>\n<ul class=\"ul1\">\n<li class=\"li1\"><span class=\"s1\"><b>Introduction, context and motivation<\/b><\/span><\/li>\n<li class=\"li1\"><b><\/b><span class=\"s1\"><b>Data-flow based obfuscation<\/b><\/span>\n<ul class=\"ul1\">\n<li class=\"li1\"><i><\/i><span class=\"s1\"><i>Constant unfolding<\/i><\/span><\/li>\n<li class=\"li1\"><i><\/i><span class=\"s1\"><i>Dead code insertion<\/i><\/span><\/li>\n<li class=\"li1\"><i><\/i><span class=\"s1\"><i>Encodings<\/i><\/span><\/li>\n<li class=\"li1\"><i><\/i><span class=\"s1\"><i>Pattern-based obfuscation<\/i><\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"li1\"><b><\/b><span class=\"s1\"><b>Control-flow based obfuscation<\/b><\/span>\n<ul class=\"ul1\">\n<li class=\"li1\"><i><\/i><span class=\"s1\"><i>Function inlining\/outlining<\/i><\/span><\/li>\n<li class=\"li1\"><i><\/i><span class=\"s1\"><i>Opaque predicates<\/i><\/span><\/li>\n<li class=\"li1\"><i><\/i><span class=\"s1\"><i>Control-flow flattening<\/i><\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"li1\"><b><\/b><span class=\"s1\"><b>Mixing data-flow and control-flow obfuscation<\/b><\/span>\n<ul class=\"ul1\">\n<li class=\"li1\"><i><\/i><span class=\"s1\"><i>VM-based obfuscation<\/i><\/span><\/li>\n<li class=\"li1\"><i><\/i><span class=\"s1\"><i>Hardening VM-based obfuscation<\/i><\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p class=\"p1\"><strong><span class=\"s2\">Exercises<br \/>\n<\/span><\/strong><span class=\"s1\">Project &#8211; Manually craft a custom obfuscation VM<\/span><\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<p><strong>Day 2<\/strong><\/p>\n<hr \/>\n<ul class=\"ul1\">\n<li class=\"li1\"><span class=\"s1\"><b>SMT-based analysis<\/b><\/span>\n<ul class=\"ul1\">\n<li class=\"li1\"><i><\/i><span class=\"s1\"><i>A primer on SMT solvers<\/i><\/span><\/li>\n<li class=\"li1\"><i><\/i><span class=\"s1\"><i>Translate code conditions into SMT solver constraints<\/i><\/span><\/li>\n<li class=\"li1\"><i><\/i><span class=\"s1\"><i>Program analysis with SMT solvers<\/i><\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"li1\"><b><\/b><span class=\"s1\"><b>Mixed Boolean-Arithmetic<\/b><\/span>\n<ul class=\"ul1\">\n<li class=\"li1\"><i><\/i><span class=\"s1\"><i>Preliminary concepts<\/i><\/span><\/li>\n<li class=\"li1\"><i><\/i><span class=\"s1\"><i>MBA rewriting<\/i><\/span><\/li>\n<li class=\"li1\"><i><\/i><span class=\"s1\"><i>Insertion of identities<\/i><\/span><\/li>\n<li class=\"li1\"><i><\/i><span class=\"s1\"><i>Opaque constants<\/i><\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong><span class=\"s3\">Exercises<br \/>\n<\/span><\/strong><span class=\"s3\">Project &#8211; Applied MBA to obfuscate the semantics of VM-handlers<\/span><\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<p><strong>Day 3<\/strong><\/p>\n<hr \/>\n<ul class=\"pl-0\">\n<li class=\"font-weight-bold\"><strong>Symbolic execution<\/strong>\n<ul>\n<li class=\"font-italic\">Reasoning about code in a symbolic way<\/li>\n<li class=\"font-italic\">Working with native code<\/li>\n<li class=\"font-italic\">Working with intermediate representations<\/li>\n<li class=\"font-italic\">Data-flow analysis and compiler optimizations<\/li>\n<li class=\"font-italic\">Extract symbolic formulas<\/li>\n<li class=\"font-italic\">Extract path constraints<\/li>\n<li class=\"font-italic\">Plugging an SMT solver<\/li>\n<li class=\"font-italic\">Attacking obfuscation schemes<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>Guided project<\/strong> &#8211; Build your own (toy) symbolic execution engine<\/p>\n<p><strong>Exercises<\/strong><br \/>\nProject &#8211; Attack obfuscated VM and explore symbolic execution limits<\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<p><strong>Day 4<\/strong><\/p>\n<hr \/>\n<ul class=\"ul1\">\n<li class=\"li1\"><span class=\"s1\"><b>Program synthesis<\/b><\/span>\n<ul class=\"ul1\">\n<li class=\"li1\"><i><\/i><span class=\"s1\"><i>Code syntax VS Code semantics<\/i><\/span><\/li>\n<li class=\"li1\"><i><\/i><span class=\"s1\"><i>Specifying program behavior<\/i><\/span><\/li>\n<li class=\"li1\"><i><\/i><span class=\"s1\"><i>Oracle-based program synthesis<\/i><\/span><\/li>\n<li class=\"li1\"><i><\/i><span class=\"s1\"><i>Describing semantics through I\/O behavior<\/i><\/span><\/li>\n<li class=\"li1\"><i><\/i><span class=\"s1\"><i>Generating I\/O pairs<\/i><\/span><\/li>\n<li class=\"li1\"><i><\/i><span class=\"s1\"><i>Different synthesis flavors<\/i><\/span><\/li>\n<li class=\"li1\"><i><\/i><span class=\"s1\"><i>Practical considerations<\/i><\/span><\/li>\n<li class=\"li1\"><i><\/i><span class=\"s1\"><i>Attacking obfuscation schemes<\/i><\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul class=\"ul1\">\n<li class=\"li1\"><span class=\"s1\"><b>Conclusions and research directions<\/b><\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p class=\"p1\"><span class=\"s2\"><strong>Guided project<\/strong> &#8211; Build your own code semantics synthesizer<\/span><\/p>\n<p class=\"p1\"><strong><span class=\"s2\">Exercises<br \/>\n<\/span><\/strong><span class=\"s1\">Project &#8211; Recover the semantics of MBA-obfuscated VM-handlers<\/span><\/p>\n<p>&nbsp;<\/p>\n<h5><strong>Tools used<\/strong><\/h5>\n<ul>\n<li><strong>Disassemblers<\/strong>\n<ul>\n<li><em>IDA Free\/Home\/Pro<\/em><\/li>\n<li><em>Ghidra<\/em><\/li>\n<li>Radare2<\/li>\n<\/ul>\n<\/li>\n<li><strong>Obfuscation<\/strong>\n<ul>\n<li><em>Manual obfuscation<\/em><\/li>\n<li><em>O-LLVM<\/em><\/li>\n<li><em>Tigress<\/em><\/li>\n<\/ul>\n<\/li>\n<li><strong>Symbolic execution<\/strong>\n<ul>\n<li><em>Miasm<\/em><\/li>\n<li><em>Triton<\/em><\/li>\n<\/ul>\n<\/li>\n<li><strong>Program synthesis<\/strong>\n<ul>\n<li><em>Syntia<\/em><\/li>\n<li><em>Msynth<\/em><\/li>\n<li><em>Custom tooling<\/em><\/li>\n<\/ul>\n<\/li>\n<li><strong>Other tools<\/strong>\n<ul>\n<li><em>Z3<\/em><\/li>\n<li><em>Other custom tooling<\/em><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>ATTEND ONLINE: Virtual via Zoom and Discord DATE: 21-24 August 2023 TIME: 09:00 to 17:00 ICT\/GMT+7 Date Day Time Duration 21 Aug Monday 0900-17:00 ICT\/GMT+7 8 Hours 22 Aug Tuesday 0900-17:00 ICT\/GMT+7 8 Hours 23 Aug Wednesday 0900-17:00 ICT\/GMT+7 8 Hours 24 Aug Thursday 0900-17:00 ICT\/GMT+7 8 Hours Code obfuscation has become one of the [&hellip;]<\/p>\n","protected":false},"featured_media":11729,"template":"","meta":{"_acf_changed":false},"product_cat":[77,62],"product_tag":[],"class_list":{"0":"post-11730","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-hitb2023hkt","7":"product_cat-virtual","9":"first","10":"instock","11":"featured","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>An Analytical Approach to Modern Binary Deobfuscation (HKT) - HITB (in)Cyber 2024 - Abu Dhabi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/an-analytical-approach-to-modern-binary-deobfuscation-hitb2023hkt\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"An Analytical Approach to Modern Binary Deobfuscation (HKT) - HITB (in)Cyber 2024 - Abu Dhabi\" \/>\n<meta property=\"og:description\" content=\"ATTEND ONLINE: Virtual via Zoom and Discord DATE: 21-24 August 2023 TIME: 09:00 to 17:00 ICT\/GMT+7 Date Day Time Duration 21 Aug Monday 0900-17:00 ICT\/GMT+7 8 Hours 22 Aug Tuesday 0900-17:00 ICT\/GMT+7 8 Hours 23 Aug Wednesday 0900-17:00 ICT\/GMT+7 8 Hours 24 Aug Thursday 0900-17:00 ICT\/GMT+7 8 Hours Code obfuscation has become one of the [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/an-analytical-approach-to-modern-binary-deobfuscation-hitb2023hkt\/\" \/>\n<meta property=\"og:site_name\" content=\"HITB (in)Cyber 2024 - Abu Dhabi\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-06T04:53:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-content\/uploads\/sites\/21\/2023\/03\/hitb2010kul-400x300-1.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/an-analytical-approach-to-modern-binary-deobfuscation-hitb2023hkt\/\",\"url\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/an-analytical-approach-to-modern-binary-deobfuscation-hitb2023hkt\/\",\"name\":\"An Analytical Approach to Modern Binary Deobfuscation (HKT) - HITB (in)Cyber 2024 - Abu Dhabi\",\"isPartOf\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/an-analytical-approach-to-modern-binary-deobfuscation-hitb2023hkt\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/an-analytical-approach-to-modern-binary-deobfuscation-hitb2023hkt\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-content\/uploads\/sites\/21\/2023\/03\/hitb2010kul-400x300-1.jpeg\",\"datePublished\":\"2023-03-20T08:27:55+00:00\",\"dateModified\":\"2023-07-06T04:53:42+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/an-analytical-approach-to-modern-binary-deobfuscation-hitb2023hkt\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/an-analytical-approach-to-modern-binary-deobfuscation-hitb2023hkt\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/an-analytical-approach-to-modern-binary-deobfuscation-hitb2023hkt\/#primaryimage\",\"url\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-content\/uploads\/sites\/21\/2023\/03\/hitb2010kul-400x300-1.jpeg\",\"contentUrl\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-content\/uploads\/sites\/21\/2023\/03\/hitb2010kul-400x300-1.jpeg\",\"width\":400,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/an-analytical-approach-to-modern-binary-deobfuscation-hitb2023hkt\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Shop\",\"item\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/shop\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"An Analytical Approach to Modern Binary Deobfuscation (HKT)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/#website\",\"url\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/\",\"name\":\"HITB (in)Cyber 2024 - Abu Dhabi\",\"description\":\"May 14 - 16, Etihad Arena \",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/conference.hitb.org\/hitbincyber2024\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"An Analytical Approach to Modern Binary Deobfuscation (HKT) - HITB (in)Cyber 2024 - Abu Dhabi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/an-analytical-approach-to-modern-binary-deobfuscation-hitb2023hkt\/","og_locale":"en_US","og_type":"article","og_title":"An Analytical Approach to Modern Binary Deobfuscation (HKT) - HITB (in)Cyber 2024 - Abu Dhabi","og_description":"ATTEND ONLINE: Virtual via Zoom and Discord DATE: 21-24 August 2023 TIME: 09:00 to 17:00 ICT\/GMT+7 Date Day Time Duration 21 Aug Monday 0900-17:00 ICT\/GMT+7 8 Hours 22 Aug Tuesday 0900-17:00 ICT\/GMT+7 8 Hours 23 Aug Wednesday 0900-17:00 ICT\/GMT+7 8 Hours 24 Aug Thursday 0900-17:00 ICT\/GMT+7 8 Hours Code obfuscation has become one of the [&hellip;]","og_url":"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/an-analytical-approach-to-modern-binary-deobfuscation-hitb2023hkt\/","og_site_name":"HITB (in)Cyber 2024 - Abu Dhabi","article_modified_time":"2023-07-06T04:53:42+00:00","og_image":[{"width":400,"height":300,"url":"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-content\/uploads\/sites\/21\/2023\/03\/hitb2010kul-400x300-1.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/an-analytical-approach-to-modern-binary-deobfuscation-hitb2023hkt\/","url":"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/an-analytical-approach-to-modern-binary-deobfuscation-hitb2023hkt\/","name":"An Analytical Approach to Modern Binary Deobfuscation (HKT) - HITB (in)Cyber 2024 - Abu Dhabi","isPartOf":{"@id":"https:\/\/conference.hitb.org\/hitbincyber2024\/#website"},"primaryImageOfPage":{"@id":"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/an-analytical-approach-to-modern-binary-deobfuscation-hitb2023hkt\/#primaryimage"},"image":{"@id":"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/an-analytical-approach-to-modern-binary-deobfuscation-hitb2023hkt\/#primaryimage"},"thumbnailUrl":"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-content\/uploads\/sites\/21\/2023\/03\/hitb2010kul-400x300-1.jpeg","datePublished":"2023-03-20T08:27:55+00:00","dateModified":"2023-07-06T04:53:42+00:00","breadcrumb":{"@id":"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/an-analytical-approach-to-modern-binary-deobfuscation-hitb2023hkt\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/conference.hitb.org\/hitbincyber2024\/product\/an-analytical-approach-to-modern-binary-deobfuscation-hitb2023hkt\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/an-analytical-approach-to-modern-binary-deobfuscation-hitb2023hkt\/#primaryimage","url":"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-content\/uploads\/sites\/21\/2023\/03\/hitb2010kul-400x300-1.jpeg","contentUrl":"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-content\/uploads\/sites\/21\/2023\/03\/hitb2010kul-400x300-1.jpeg","width":400,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/conference.hitb.org\/hitbincyber2024\/product\/an-analytical-approach-to-modern-binary-deobfuscation-hitb2023hkt\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/conference.hitb.org\/hitbincyber2024\/"},{"@type":"ListItem","position":2,"name":"Shop","item":"https:\/\/conference.hitb.org\/hitbincyber2024\/shop\/"},{"@type":"ListItem","position":3,"name":"An Analytical Approach to Modern Binary Deobfuscation (HKT)"}]},{"@type":"WebSite","@id":"https:\/\/conference.hitb.org\/hitbincyber2024\/#website","url":"https:\/\/conference.hitb.org\/hitbincyber2024\/","name":"HITB (in)Cyber 2024 - Abu Dhabi","description":"May 14 - 16, Etihad Arena ","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/conference.hitb.org\/hitbincyber2024\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-json\/wp\/v2\/product\/11730"}],"collection":[{"href":"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-json\/wp\/v2\/media\/11729"}],"wp:attachment":[{"href":"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-json\/wp\/v2\/media?parent=11730"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-json\/wp\/v2\/product_cat?post=11730"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbincyber2024\/wp-json\/wp\/v2\/product_tag?post=11730"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}