By: Alexei Bulazel
Scheduled on: February 2 at 10:30
We’ll cover reverse engineering the JS engine, including how it works (types, memory management, JS/ECMAScript features, integration with Defender’s antivirus system, etc.), building tooling to interact with it, non-security JS runtime bugs, anti-analysis tricks for malicious scripts, and a bit on the engine’s attack surface for exploitation.
We’ll conclude by considering other attack surface within the remaining 98% of this enormous binary.