Binary – S3lab http://s3lab.deusto.es S3lab Security Blog Wed, 06 May 2020 12:51:35 +0000 en-US hourly 1 https://wordpress.org/?v=5.1.5 Create an unreadable binary with these techniques http://s3lab.deusto.es/unreadable-binary-techniques/ Fri, 23 Jun 2017 09:57:36 +0000 http://s3lab.deusto.es/?p=9200 Whether for malicious purposes, such as the case of malware authors, for corporate purposes, or for other reasons, obfuscation techniques are used to protect a program by making compiled binary static analysis more costly. Obfuscation therefore consists of transforming a

The post Create an unreadable binary with these techniques appeared first on S3lab.

]]>
Whether for malicious purposes, such as the case of malware authors, for corporate purposes, or for other reasons, obfuscation techniques are used to protect a program by making compiled binary static analysis more costly. Obfuscation therefore consists of transforming a program in a way that is more difficult to understand, but at the same time maintains the original semantics.

The post Create an unreadable binary with these techniques appeared first on S3lab.

]]>
Hardening binaries (II) – PIE http://s3lab.deusto.es/hardening-binaries-2/ Tue, 28 Jun 2016 09:57:45 +0000 http://s3lab.deusto.es/?p=8305 Following the classic compilation options of GCC to try to have more robust binary, in this post we will discuss the options and -fPIE -fpie that allows to compile executable as “Position Independent Executables” and makes their sections to be loaded in random

The post Hardening binaries (II) – PIE appeared first on S3lab.

]]>
Following the classic compilation options of GCC to try to have more robust binary, in this post we will discuss the options and -fPIE -fpie that allows to compile executable as “Position Independent Executables” and makes their sections to be loaded in random positions.

The post Hardening binaries (II) – PIE appeared first on S3lab.

]]>
Hardening binaries (I) – The stack http://s3lab.deusto.es/hardening-binaries-1/ Tue, 03 May 2016 10:15:11 +0000 http://s3lab.deusto.es/?p=8128 Among the many options of GCC, some of them are specifically made to make our binaries much more robust against memory corruption techniques. Stack protection techniques try to prevent contiguous blocks of memory, caused by a buffer overflow, which may

The post Hardening binaries (I) – The stack appeared first on S3lab.

]]>
Among the many options of GCC, some of them are specifically made to make our binaries much more robust against memory corruption techniques. Stack protection techniques try to prevent contiguous blocks of memory, caused by a buffer overflow, which may contain critical information of program control , such as memory addresses, function pointers and pointer frame is overwritten.

The post Hardening binaries (I) – The stack appeared first on S3lab.

]]>
Binary palindrome years, the forgotten ones http://s3lab.deusto.es/binary-palindrome-years/ Tue, 16 Dec 2014 10:56:21 +0000 http://s3lab.deusto.es/?p=2984 2015 is a binary palindrome year. If you wonder what does that exactly mean, very simple, if we convert the year from decimal to binary we find that this number is palindrome (11111011111). It is an interesting fact that after realizing of it

The post Binary palindrome years, the forgotten ones appeared first on S3lab.

]]>
2015 is a binary palindrome year. If you wonder what does that exactly mean, very simple, if we convert the year from decimal to binary we find that this number is palindrome (11111011111). It is an interesting fact that after realizing of it I decided to analyze it a little bit more.

The post Binary palindrome years, the forgotten ones appeared first on S3lab.

]]>