Create an unreadable binary with these techniques

Whether for malicious purposes, such as the case of malware authors, for corporate purposes, or for other reasons, obfuscation techniques are used to protect a program by making compiled binary static analysis more costly. Obfuscation therefore consists of transforming a

Legal framework of impersonation (IV)

Continuing with the previous posts where we talked about the most common forms of identity theft on the internet, and having specified the usual modus operandi from the beginning to the end, we have not come to the end to

A denial of service is worth thousands of requests

Denial of Service (DOS) attacks are one of the most commonly used digital “weapons” for many purposes today. Some of its uses are blackmail, control of competitors, power test or deviation of attention. The concept of denial of service is

The memory corruption errors

When we talk about memory corruption errors, the first thing that we see at the head is the classic buffer overflow, which makes a lot of sense since, some called it the vulnerability of the decade back in 2000, nowadays continues

PackerInspector: Our sandbox for packers

We are pleased to present you PackerInspector, a new on-line service for packer analysis, created as the result of the research presented at IEEE Security & Privacy en 2015: SoK: Deep Packer Inspection: A Longitudinal Study of the Complexity of

How does a compiler work?

In the series Hardening  binaries posts you have seen that many defenses are implanted in the compilers themselves, but how are they implemented? Taking the case of GCC, the GNU compiler collection, let’s explain the general GCC infrastructure and roughly how

Legal framework of impersonation (III)

Continuing with the previous post where the typical identity impersonation behaviors are identified, and once we have identified the legal basis that recognizes criminal type based on article 248.1 LO 10/1995 of the Criminal Code, Operandi usually follows the offense

That malware knows that they are watching it

It is extremely common for advanced malware not only to hide its code with different packers, but also to try to detect if it is being analyzed dynamically through a sandbox. If they realize that they are watching it, they

Security Research (VIII) – Papers, Language

We return to one of the foundations of scientific life: writing contributions or papers. Previously, we had talked about the structure that interested us in Computer and Security of the particular system: (i) summary, (ii) introduction, (iii) [background], (iv) method,

console.log(blog 1095 days up)

Although it seems like we started yesterday , it’s been 3 years. We have learned a lot during this time, and we hope you too. Many thanks to all of you who have collaborated, and of course, to all the

PackerInspector

Our sandbox for packers

Categories