{"id":11730,"date":"2023-03-20T08:27:55","date_gmt":"2023-03-20T08:27:55","guid":{"rendered":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/an-analytical-approach-to-modern-binary-deobfuscation-hitb2023hkt\/"},"modified":"2023-08-19T14:15:54","modified_gmt":"2023-08-19T14:15:54","slug":"an-analytical-approach-to-modern-binary-deobfuscation-hitb2023hkt","status":"publish","type":"product","link":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/an-analytical-approach-to-modern-binary-deobfuscation-hitb2023hkt\/","title":{"rendered":"An Analytical Approach to Modern Binary Deobfuscation (HKT)"},"content":{"rendered":"<div class=\"page\" title=\"Page 3\">\n<div class=\"layoutArea\">\n<h4><strong><span style=\"color: #993300\">REGISTRATION CLOSED<\/span><\/strong><\/h4>\n<\/div>\n<\/div>\n<h4><strong>DATE: 21-24 August 2023<\/strong><\/h4>\n<h4><strong>TIME: 09:00 to 17:00 ICT\/GMT+7<\/strong><\/h4>\n<table style=\"height: 146px\" width=\"599\">\n<tbody>\n<tr>\n<td><strong>Date<\/strong><\/td>\n<td><strong>Day<\/strong><\/td>\n<td style=\"text-align: left\"><strong>Time<\/strong><\/td>\n<td><strong>Duration<\/strong><\/td>\n<\/tr>\n<tr>\n<td>21 Aug<\/td>\n<td>Monday<\/td>\n<td>0900-17:00 ICT\/GMT+7<\/td>\n<td>8 Hours<\/td>\n<\/tr>\n<tr>\n<td>22 Aug<\/td>\n<td>Tuesday<\/td>\n<td>0900-17:00 ICT\/GMT+7<\/td>\n<td>8 Hours<\/td>\n<\/tr>\n<tr>\n<td>23 Aug<\/td>\n<td>Wednesday<\/td>\n<td>0900-17:00 ICT\/GMT+7<\/td>\n<td>8 Hours<\/td>\n<\/tr>\n<tr>\n<td>24 Aug<\/td>\n<td>Thursday<\/td>\n<td>0900-17:00 ICT\/GMT+7<\/td>\n<td>8 Hours<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<hr \/>\n<h5>Code obfuscation has become one of the most prevalent mechanisms aiming to complicate the process of software reverse engineering. It plays a major role on a wide range of domains: from malware threats to protection of intellectual property and digital rights management.<\/h5>\n<p><em>An Analytical approach to Modern Binary Deobfuscation<\/em>\u00a0is a curated training that provides an intensive jump-start into the field of code (de)obfuscation. Over the course of this training, students will receive a comprehensive introduction to the most relevant software obfuscation mechanisms as well as existing deobfuscation techniques to analyze, confront and defeat obfuscated code.<\/p>\n<h5><\/h5>\n<h5><strong>Teaching Methodology<\/strong><\/h5>\n<p>Live classes are designed to be dynamic and engaging, making the students get the most out of the training materials and instructor expertise. A clear presentation of the concepts, accompanied by illustrative examples and demos. For each section, there will be practice time allocated. The students will be provided with several exercises and projects to work on, with the continuous support of the instructor.<\/p>\n<p>&nbsp;<\/p>\n<h5><strong>Key Learning Objectives<\/strong><\/h5>\n<ul>\n<li>Obtain a high-level overview of the context and scenarios where code obfuscation is used<\/li>\n<li>Gain an in-depth understanding of code obfuscation mechanisms<\/li>\n<li>Build obfuscated code, both from scratch and through available tooling<\/li>\n<li>Develop an understanding of the main code deobfuscation techniques<\/li>\n<li>Learn tooling for analyzing obfuscated code and apply deobfuscation techniques<\/li>\n<li>Become familiar with state of the art (de)obfuscation research literature<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h5 class=\"font-primary text-dark\"><strong>Students will be provided with<\/strong><\/h5>\n<ul class=\"pl-2\">\n<li>Access to a VM with all tools, examples and exercises<\/li>\n<li>Access to a private chat with instructor and other students<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h5><strong>Agenda<\/strong><\/h5>\n<hr \/>\n<p><strong>Day 1<\/strong><\/p>\n<hr \/>\n<ul class=\"ul1\">\n<li class=\"li1\"><span class=\"s1\"><b>Introduction, context and motivation<\/b><\/span><\/li>\n<li class=\"li1\"><b><\/b><span class=\"s1\"><b>Data-flow based obfuscation<\/b><\/span>\n<ul class=\"ul1\">\n<li class=\"li1\"><i><\/i><span class=\"s1\"><i>Constant unfolding<\/i><\/span><\/li>\n<li class=\"li1\"><i><\/i><span class=\"s1\"><i>Dead code insertion<\/i><\/span><\/li>\n<li class=\"li1\"><i><\/i><span class=\"s1\"><i>Encodings<\/i><\/span><\/li>\n<li class=\"li1\"><i><\/i><span class=\"s1\"><i>Pattern-based obfuscation<\/i><\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"li1\"><b><\/b><span class=\"s1\"><b>Control-flow based obfuscation<\/b><\/span>\n<ul class=\"ul1\">\n<li class=\"li1\"><i><\/i><span class=\"s1\"><i>Function inlining\/outlining<\/i><\/span><\/li>\n<li class=\"li1\"><i><\/i><span class=\"s1\"><i>Opaque predicates<\/i><\/span><\/li>\n<li class=\"li1\"><i><\/i><span class=\"s1\"><i>Control-flow flattening<\/i><\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"li1\"><b><\/b><span class=\"s1\"><b>Mixing data-flow and control-flow obfuscation<\/b><\/span>\n<ul class=\"ul1\">\n<li class=\"li1\"><i><\/i><span class=\"s1\"><i>VM-based obfuscation<\/i><\/span><\/li>\n<li class=\"li1\"><i><\/i><span class=\"s1\"><i>Hardening VM-based obfuscation<\/i><\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p class=\"p1\"><strong><span class=\"s2\">Exercises<br \/>\n<\/span><\/strong><span class=\"s1\">Project &#8211; Manually craft a custom obfuscation VM<\/span><\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<p><strong>Day 2<\/strong><\/p>\n<hr \/>\n<ul class=\"ul1\">\n<li class=\"li1\"><span class=\"s1\"><b>SMT-based analysis<\/b><\/span>\n<ul class=\"ul1\">\n<li class=\"li1\"><i><\/i><span class=\"s1\"><i>A primer on SMT solvers<\/i><\/span><\/li>\n<li class=\"li1\"><i><\/i><span class=\"s1\"><i>Translate code conditions into SMT solver constraints<\/i><\/span><\/li>\n<li class=\"li1\"><i><\/i><span class=\"s1\"><i>Program analysis with SMT solvers<\/i><\/span><\/li>\n<\/ul>\n<\/li>\n<li class=\"li1\"><b><\/b><span class=\"s1\"><b>Mixed Boolean-Arithmetic<\/b><\/span>\n<ul class=\"ul1\">\n<li class=\"li1\"><i><\/i><span class=\"s1\"><i>Preliminary concepts<\/i><\/span><\/li>\n<li class=\"li1\"><i><\/i><span class=\"s1\"><i>MBA rewriting<\/i><\/span><\/li>\n<li class=\"li1\"><i><\/i><span class=\"s1\"><i>Insertion of identities<\/i><\/span><\/li>\n<li class=\"li1\"><i><\/i><span class=\"s1\"><i>Opaque constants<\/i><\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong><span class=\"s3\">Exercises<br \/>\n<\/span><\/strong><span class=\"s3\">Project &#8211; Applied MBA to obfuscate the semantics of VM-handlers<\/span><\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<p><strong>Day 3<\/strong><\/p>\n<hr \/>\n<ul class=\"pl-0\">\n<li class=\"font-weight-bold\"><strong>Symbolic execution<\/strong>\n<ul>\n<li class=\"font-italic\">Reasoning about code in a symbolic way<\/li>\n<li class=\"font-italic\">Working with native code<\/li>\n<li class=\"font-italic\">Working with intermediate representations<\/li>\n<li class=\"font-italic\">Data-flow analysis and compiler optimizations<\/li>\n<li class=\"font-italic\">Extract symbolic formulas<\/li>\n<li class=\"font-italic\">Extract path constraints<\/li>\n<li class=\"font-italic\">Plugging an SMT solver<\/li>\n<li class=\"font-italic\">Attacking obfuscation schemes<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>Guided project<\/strong> &#8211; Build your own (toy) symbolic execution engine<\/p>\n<p><strong>Exercises<\/strong><br \/>\nProject &#8211; Attack obfuscated VM and explore symbolic execution limits<\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<p><strong>Day 4<\/strong><\/p>\n<hr \/>\n<ul class=\"ul1\">\n<li class=\"li1\"><span class=\"s1\"><b>Program synthesis<\/b><\/span>\n<ul class=\"ul1\">\n<li class=\"li1\"><i><\/i><span class=\"s1\"><i>Code syntax VS Code semantics<\/i><\/span><\/li>\n<li class=\"li1\"><i><\/i><span class=\"s1\"><i>Specifying program behavior<\/i><\/span><\/li>\n<li class=\"li1\"><i><\/i><span class=\"s1\"><i>Oracle-based program synthesis<\/i><\/span><\/li>\n<li class=\"li1\"><i><\/i><span class=\"s1\"><i>Describing semantics through I\/O behavior<\/i><\/span><\/li>\n<li class=\"li1\"><i><\/i><span class=\"s1\"><i>Generating I\/O pairs<\/i><\/span><\/li>\n<li class=\"li1\"><i><\/i><span class=\"s1\"><i>Different synthesis flavors<\/i><\/span><\/li>\n<li class=\"li1\"><i><\/i><span class=\"s1\"><i>Practical considerations<\/i><\/span><\/li>\n<li class=\"li1\"><i><\/i><span class=\"s1\"><i>Attacking obfuscation schemes<\/i><\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul class=\"ul1\">\n<li class=\"li1\"><span class=\"s1\"><b>Conclusions and research directions<\/b><\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p class=\"p1\"><span class=\"s2\"><strong>Guided project<\/strong> &#8211; Build your own code semantics synthesizer<\/span><\/p>\n<p class=\"p1\"><strong><span class=\"s2\">Exercises<br \/>\n<\/span><\/strong><span class=\"s1\">Project &#8211; Recover the semantics of MBA-obfuscated VM-handlers<\/span><\/p>\n<p>&nbsp;<\/p>\n<h5><strong>Tools used<\/strong><\/h5>\n<ul>\n<li><strong>Disassemblers<\/strong>\n<ul>\n<li><em>IDA Free\/Home\/Pro<\/em><\/li>\n<li><em>Ghidra<\/em><\/li>\n<li>Radare2<\/li>\n<\/ul>\n<\/li>\n<li><strong>Obfuscation<\/strong>\n<ul>\n<li><em>Manual obfuscation<\/em><\/li>\n<li><em>O-LLVM<\/em><\/li>\n<li><em>Tigress<\/em><\/li>\n<\/ul>\n<\/li>\n<li><strong>Symbolic execution<\/strong>\n<ul>\n<li><em>Miasm<\/em><\/li>\n<li><em>Triton<\/em><\/li>\n<\/ul>\n<\/li>\n<li><strong>Program synthesis<\/strong>\n<ul>\n<li><em>Syntia<\/em><\/li>\n<li><em>Msynth<\/em><\/li>\n<li><em>Custom tooling<\/em><\/li>\n<\/ul>\n<\/li>\n<li><strong>Other tools<\/strong>\n<ul>\n<li><em>Z3<\/em><\/li>\n<li><em>Other custom tooling<\/em><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>REGISTRATION CLOSED DATE: 21-24 August 2023 TIME: 09:00 to 17:00 ICT\/GMT+7 Date Day Time Duration 21 Aug Monday 0900-17:00 ICT\/GMT+7 8 Hours 22 Aug Tuesday 0900-17:00 ICT\/GMT+7 8 Hours 23 Aug Wednesday 0900-17:00 ICT\/GMT+7 8 Hours 24 Aug Thursday 0900-17:00 ICT\/GMT+7 8 Hours Code obfuscation has become one of the most prevalent mechanisms aiming to [&hellip;]<\/p>\n","protected":false},"featured_media":11729,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false},"product_cat":[77,62],"product_tag":[],"class_list":{"0":"post-11730","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-hitb2023hkt","7":"product_cat-virtual","9":"first","10":"instock","11":"featured","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>An Analytical Approach to Modern Binary Deobfuscation (HKT) - HITBSecConf2023 - Phuket<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/an-analytical-approach-to-modern-binary-deobfuscation-hitb2023hkt\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"An Analytical Approach to Modern Binary Deobfuscation (HKT) - HITBSecConf2023 - Phuket\" \/>\n<meta property=\"og:description\" content=\"REGISTRATION CLOSED DATE: 21-24 August 2023 TIME: 09:00 to 17:00 ICT\/GMT+7 Date Day Time Duration 21 Aug Monday 0900-17:00 ICT\/GMT+7 8 Hours 22 Aug Tuesday 0900-17:00 ICT\/GMT+7 8 Hours 23 Aug Wednesday 0900-17:00 ICT\/GMT+7 8 Hours 24 Aug Thursday 0900-17:00 ICT\/GMT+7 8 Hours Code obfuscation has become one of the most prevalent mechanisms aiming to [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/an-analytical-approach-to-modern-binary-deobfuscation-hitb2023hkt\/\" \/>\n<meta property=\"og:site_name\" content=\"HITBSecConf2023 - Phuket\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-19T14:15:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-content\/uploads\/sites\/19\/2023\/03\/hitb2010kul-400x300-1.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/an-analytical-approach-to-modern-binary-deobfuscation-hitb2023hkt\/\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/an-analytical-approach-to-modern-binary-deobfuscation-hitb2023hkt\/\",\"name\":\"An Analytical Approach to Modern Binary Deobfuscation (HKT) - HITBSecConf2023 - Phuket\",\"isPartOf\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/an-analytical-approach-to-modern-binary-deobfuscation-hitb2023hkt\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/an-analytical-approach-to-modern-binary-deobfuscation-hitb2023hkt\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-content\/uploads\/sites\/19\/2023\/03\/hitb2010kul-400x300-1.jpeg\",\"datePublished\":\"2023-03-20T08:27:55+00:00\",\"dateModified\":\"2023-08-19T14:15:54+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/an-analytical-approach-to-modern-binary-deobfuscation-hitb2023hkt\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/an-analytical-approach-to-modern-binary-deobfuscation-hitb2023hkt\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/an-analytical-approach-to-modern-binary-deobfuscation-hitb2023hkt\/#primaryimage\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-content\/uploads\/sites\/19\/2023\/03\/hitb2010kul-400x300-1.jpeg\",\"contentUrl\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-content\/uploads\/sites\/19\/2023\/03\/hitb2010kul-400x300-1.jpeg\",\"width\":400,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/an-analytical-approach-to-modern-binary-deobfuscation-hitb2023hkt\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Shop\",\"item\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/shop\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"An Analytical Approach to Modern Binary Deobfuscation (HKT)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/#website\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/\",\"name\":\"HITBSecConf2023 - Phuket\",\"description\":\"August 22 - 26 @ InterContinental\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"An Analytical Approach to Modern Binary Deobfuscation (HKT) - HITBSecConf2023 - Phuket","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/an-analytical-approach-to-modern-binary-deobfuscation-hitb2023hkt\/","og_locale":"en_US","og_type":"article","og_title":"An Analytical Approach to Modern Binary Deobfuscation (HKT) - HITBSecConf2023 - Phuket","og_description":"REGISTRATION CLOSED DATE: 21-24 August 2023 TIME: 09:00 to 17:00 ICT\/GMT+7 Date Day Time Duration 21 Aug Monday 0900-17:00 ICT\/GMT+7 8 Hours 22 Aug Tuesday 0900-17:00 ICT\/GMT+7 8 Hours 23 Aug Wednesday 0900-17:00 ICT\/GMT+7 8 Hours 24 Aug Thursday 0900-17:00 ICT\/GMT+7 8 Hours Code obfuscation has become one of the most prevalent mechanisms aiming to [&hellip;]","og_url":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/an-analytical-approach-to-modern-binary-deobfuscation-hitb2023hkt\/","og_site_name":"HITBSecConf2023 - Phuket","article_modified_time":"2023-08-19T14:15:54+00:00","og_image":[{"width":400,"height":300,"url":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-content\/uploads\/sites\/19\/2023\/03\/hitb2010kul-400x300-1.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/an-analytical-approach-to-modern-binary-deobfuscation-hitb2023hkt\/","url":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/an-analytical-approach-to-modern-binary-deobfuscation-hitb2023hkt\/","name":"An Analytical Approach to Modern Binary Deobfuscation (HKT) - HITBSecConf2023 - Phuket","isPartOf":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/#website"},"primaryImageOfPage":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/an-analytical-approach-to-modern-binary-deobfuscation-hitb2023hkt\/#primaryimage"},"image":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/an-analytical-approach-to-modern-binary-deobfuscation-hitb2023hkt\/#primaryimage"},"thumbnailUrl":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-content\/uploads\/sites\/19\/2023\/03\/hitb2010kul-400x300-1.jpeg","datePublished":"2023-03-20T08:27:55+00:00","dateModified":"2023-08-19T14:15:54+00:00","breadcrumb":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/an-analytical-approach-to-modern-binary-deobfuscation-hitb2023hkt\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/an-analytical-approach-to-modern-binary-deobfuscation-hitb2023hkt\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/an-analytical-approach-to-modern-binary-deobfuscation-hitb2023hkt\/#primaryimage","url":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-content\/uploads\/sites\/19\/2023\/03\/hitb2010kul-400x300-1.jpeg","contentUrl":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-content\/uploads\/sites\/19\/2023\/03\/hitb2010kul-400x300-1.jpeg","width":400,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/product\/an-analytical-approach-to-modern-binary-deobfuscation-hitb2023hkt\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/"},{"@type":"ListItem","position":2,"name":"Shop","item":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/shop\/"},{"@type":"ListItem","position":3,"name":"An Analytical Approach to Modern Binary Deobfuscation (HKT)"}]},{"@type":"WebSite","@id":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/#website","url":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/","name":"HITBSecConf2023 - Phuket","description":"August 22 - 26 @ InterContinental","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-json\/wp\/v2\/product\/11730"}],"collection":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-json\/wp\/v2\/types\/product"}],"replies":[{"embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-json\/wp\/v2\/comments?post=11730"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-json\/wp\/v2\/media\/11729"}],"wp:attachment":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-json\/wp\/v2\/media?parent=11730"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-json\/wp\/v2\/product_cat?post=11730"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/conference.hitb.org\/hitbsecconf2023hkt\/wp-json\/wp\/v2\/product_tag?post=11730"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}