A Logo

Feel free to include my content in your page via my
RSS feed

Help Irongeek.com pay for
bandwidth and research equipment:

Search Irongeek.com:

Affiliates:
Irongeek Button
Social-engineer-training Button

Help Irongeek.com pay for bandwidth and research equipment:

paypalpixle


The M/o/Vfuscator - Turning 'mov' into a soul-crushing RE nightmare - Christopher Domas Derbycon 2015 (Hacking Illustrated Series InfoSec Tutorial Videos)

The M/o/Vfuscator - Turning 'mov' into a soul-crushing RE nightmare
Christopher Domas
Derbycon 2015

Based on a paper that proves that the "mov" instruction is Turing complete, the M/o/Vfuscator takes source code and compiles it into a program that uses _only_ mov instructions - no comparisons, no jumps, no math, and definitely no SMC cheating. We'll walk through the creation of the world's first single instruction C compiler, demonstrate the absurdity of single instruction computing, and see how an infinite loop of unconditional movs can turn the simplest programs into the most painfully difficult reverse engineering targets you will ever encounter.

Chris is an embedded systems engineer and cyber security researcher, focused on innovative approaches to low level hardware and software RE and exploitation.

Back to Derbycon 2015 video list

Printable version of this article

15 most recent posts on Irongeek.com:


If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2016, IronGeek
Louisville / Kentuckiana Information Security Enthusiast