2025-10-24 –, Europe
Processors execute code sequentially, in a natural order - typically presented as top to bottom. Of course, this makes reverse engineering programs easy. Can we do better?
Presented is a silly code obfuscation technique that demonstrates how expectations can be broken with x64 debug register abuse and a bit of magic. We also get (partial) anti-debugging and (partial) anti-VM measures as a bonus on top.
Primarily occupied by Bachelor's studies in Quantum Technology in Finland. Also CTF'ing as part of the Luxembourgish cybersecurity team, and doing a bit of everything otherwise.