PIN-Point Control for Analyzing Malware
Reversing malware can be tedious and time-consuming, especially when it comes to dealing with binary protocols, obfuscation, or encryption. PIN is a dynamic binary instrumentation tool that is commonly used in various aspects of vulnerability analysis, but it can also be put to use in tackling difficult and/or tedious tasks encountered when reversing malware.
This talk will cover malware use-cases for PIN and some instances where it is not the right tool for the job. The presentation will include a survey of existing PIN tools that can be leveraged for analyzing malware and will conclude with a few WIP PIN tools authored by the presenter to aid reversing and extracting information from some specific malware families.
Start time: 15:00
Room: Grand Salon Opera