(Adding VB) |
No edit summary |
||
Line 12: | Line 12: | ||
Hello World! | Hello World! | ||
== Projects == | == Projects == | ||
* [[52455645525345]] - Reverse Engineering | * [[52455645525345]] - Reverse Engineering Group | ||
* [[Assembly_x86]] | * [[Assembly_x86]] - x86 Group | ||
== Talks & More == | == Talks & More == | ||
Line 28: | Line 27: | ||
* [https://chaosdorf.de/~barbieauglend/Analysing-compiled-binaries-using-logic.pdf VB2018 Paper on Using automated Theorem Proving to Analyze Malware] | * [https://chaosdorf.de/~barbieauglend/Analysing-compiled-binaries-using-logic.pdf VB2018 Paper on Using automated Theorem Proving to Analyze Malware] | ||
* [https://chaosdorf.de/~barbieauglend/final_preso.pdf and the full slide deck] | * [https://chaosdorf.de/~barbieauglend/final_preso.pdf and the full slide deck] | ||
* [https://www.youtube.com/watch?v=GMr1rK-Gsdo&feature=youtu.be Automated Exploit Generation (in pt_br)] | |||
== Can be also found == | == Can be also found == |