This blog post demonstrates through an example how the Epona obfuscating compiler, from the Epona Application Protection Suite, achieves the challenge of facilitating the everyday experience of its users while enabling better obfuscation schemes trade-offs.
more ...What happens if one builds up on the Spectre vulnerability to implement a convoluted version of memcpy? From an obfuscator point-of-view, it unleashes a wide range of opportunities, which turn a definite bug into a fun[nk]y feature.
more ...Some experiments to mistreat the Triton concolic execution framework through simple forged C programs.
more ...Quarkslab's compiler crew is going to LLVM developer Meeting in CA!
more ...Mixed Boolean-Arithmetic expressions can be used as an obfuscation technique. Why are they hard to de-obfuscate, and what do we need to do so?
more ...Where a simple xor gets transformed beyond what it ever thought
more ...A "hands-on" introduction to LLVM passes through obfuscation.
more ...We recently looked at the Obfuscator-LLVM project in order to test its different protections. Here are our results, and explanations on how we deal with obfuscation.
more ...