Virtualization-based security technique is a popular technique to protect and run sensitive code. The challenge it brings is the additional task of reverse engineering a code implemented with custom instructions in the context of an application protected with multiple layers of protections. In this context, lifting the to-be-reverse-engineered code outside and emulating it, would be one of the best solution. In this training, you will learn to use Unicron with the aim of recovering the custom code of a virtual machine embedded within an application.
This is the second module of a 3-parts exercise.
You will have to use Unicorn in order implement a custom CPU so the code that was recovered from the first part of the exercise can be executed and analysed at runtime.
The main objective of the exercise is to reverse engineer the code of a custom virtual machine that is used to execute a custom code that implement sensitive code.
Overall duration: 5 to 10 days
Schedule: 9.30AM - 12PM (CET/CEST) - virtual/in person
Number of trainees: 2 trainees max.