SMT in reverse engineering, for dummies

Поделиться
HTML-код
  • Опубликовано: 11 дек 2024

Комментарии • 13

  • @MySqueezingArm
    @MySqueezingArm 4 года назад +1

    Thank you for the very informative content. Downloaded so I can rewatch a few times to grasp the topic.

  • @funtari7
    @funtari7 4 года назад

    Kul att det dök upp på min rekommendation så att säga... Tack för undervisningen gubben! 🙏

  • @avi-brown
    @avi-brown 10 месяцев назад +2

    Thanks, very interesting

  • @adumont
    @adumont 4 года назад +1

    Thanks Carl, great talk, interesting tools, thanks for sharing your method.

    • @ZetaTwo
      @ZetaTwo  4 года назад

      Thanks! Glad that you enjoyed it!

  • @AndrewMorrisintheforest
    @AndrewMorrisintheforest 8 лет назад +1

    This was an incredible talk. Thanks so much for giving it.

    • @ZetaTwo
      @ZetaTwo  8 лет назад

      Thanks! Glad to hear you enjoyed it. Will hopefully create more in the future.

  • @DarioCangialosi
    @DarioCangialosi 6 лет назад

    this applies to many fields e.g. cryptographic functions... ;)

    • @ZetaTwo
      @ZetaTwo  6 лет назад

      Dario Cangialosi Actually, any proper cryptographic function is completely immune to this kind of analysis. However some home baked solutions, for example the Petya malware was broken with methods like this.

  • @samuelvidal3437
    @samuelvidal3437 7 лет назад +1

    if you type randomly you have 1 chance in 10 of succeeding it seems

    • @ZetaTwo
      @ZetaTwo  7 лет назад +3

      Yes, its exactly 1/10 chance since the algorithm just checks that the last digit matches the checksum. The point of the talk however, is not the specific algorithm but the general methodology used to analyze the problem.