Quarkslab's blog
  • Android
  • Android, ReverseEngineering
  • Challenge
  • Cryptography
  • Development
  • Exploitation
  • Fuzzing
    • Archives
  • social

  • atom feed
  • twitter
  • github
  • Categories

  • Android
  • Android, ReverseEngineering
  • Challenge
  • Cryptography
  • Development
  • Exploitation
  • Fuzzing
  • Hardware
  • Hardware, ReverseEngineering
  • Kernel Debugging
  • Life at Quarkslab
  • Maths
  • Obfuscation
  • PenTest
  • Program Analysis
  • Programming
  • ReverseEngineering
  • Software
  • Vulnerability
  • Tags

PhD Defense of Jonathan Salwan: Use of Symbolic Execution for Binary Deobfuscation

Date Thu 13 February 2020 By Quarkslab Category Life at Quarkslab. Tags ReverseEngineering Program Analysis
more ...


Powered by Pelican , Theme is from Bootstrap from Twitter