Learn, hack!

Hacking and security documentation: slides, papers, video and audio recordings. All in high-quality, daily updated, avoiding security crap documents. Spreading hacking knowledge, for free, enjoy. Follow on .

Runtime binary encryption on the UNIX platform

Type
Audio
Tags
UNIX
Event
Chaos Communication Congress 18th (18C3) 2001
Indexed on
Mar 27, 2013
URL
http://ftp.ccc.de/congress/2001/mp3/vortraege/tag3/saal2/29-s2-1600-Runtime-binary-encryption-on-Unix.mp3
File name
29-s2-1600-Runtime-binary-encryption-on-Unix.mp3
File size
9.6 MB
MD5
46de89c7f771ff37aec18de779ba6e4c
SHA1
43e7d8a38a3def984ecaf0ff29a9afd10be02814

Binary encryption is the process of obfuscating and protecting a binary executeable, while still allowing the operating system to execute the binary. We will explain the current situation and problems when analyzing hostile binaries on the UNIX platform. Then we will demonstrate and explain some techniques to protect your UNIX ELF binary against reverse engineering, unauthorized use and analysis. The speech covers the basic details of the ELF executeable format, only basic UNIX knowledge is required. While th e speech itself is more practically orientied, it will be accompanied by a detailed paper for the interested readers.

About us

Secdocs is a project aimed to index high-quality IT security and hacking documents. These are fetched from multiple data sources: events, conferences and generally from interwebs.

Statistics

Serving 8166 documents and 531.0 GB of hacking knowledge, indexed from 2419 authors from 163 security conferences.

Contribute

To support this site and keep it alive, you can click on the buttons below. Any help is really appreciated! This service is provided for free, but real money is needed to pay bills.

Flattr this Click here to lend your support to: Keep live SecDocs for an year and make a donation at www.pledgie.com !