RevEngE is a dish served cold!

Marcus’ RevEngE against malware! This week SECRET arrived in Vienna to participate of the Reversing and Offensive-oriented Trends Symposium 2019 (ROOTS). Marcus discussed challenges and pitfalls of decompiling malicious samples and presented RevEnge, the Reverse Engineering Engine. RevEngE is a Proof-of-Concept (PoC) tool to the debug-oriented decompilation approached that we Read more…

SECRET @ ISC2019

Tamy Beppler, a SECRET researcher, has been presenting her research in the 2019 Information Security Conference. Tamy investigated the use of file textutres for malware families’ classification. Interested in taking a look on her results? Check this link.

SECRET @ SBSEG2019 #4

SBSEG promoted a tools exhibition event during the event. Marcus Botacin, representing SECRET, presented RevEngE, the Reverse Engineering Engine. RevEngE is a prototype of a malware decompilator aimed to assist analysts to debug malware executions. You can find all details on github.

SECRET @ SBSEG2019 #3

Marcus Botacin, a SECRET member, present his research about malware variants identification in practice. The research was awarded by the program committee during the event. Check all details on github.

Malware Analysis @ SECRET

Malware is the main SECRET research line, thus SECRET researchers are often reverse engineering malware samples. A key SECRET principle is to strongly rely on in-house developed analysis tools. We here share a bit of the SECRET-developed tools. A daily task at SECRET is to perform binary static analysis to Read more…