Blog

Automated Detection of Obfuscated Code
  • 10 August, 2021
  • by Tim Blazytko

This article is a repost. It was originally published at Tim Blazytko’s personal blog: https://synthesis.to/2021/08/10/obfuscation_detection.html. In a previous blog post, we already discussed that it is valuable to know which code areas are obfuscated; those areas often guard sensitive code and are worth a closer look.

Introduction to Control-flow Graph Analysis
  • 15 March, 2021
  • by Tim Blazytko

This article is a repost. It was originally published at Tim Blazytko’s personal blog: https://synthesis.to/2021/03/15/control_flow_analysis.html. Following my last blog post, I got a lot of questions about additional material on control-flow analysis.

Automated Detection of Control-flow Flattening
  • 03 March, 2021
  • by Tim Blazytko

This article is a repost. It was originally published at Tim Blazytko’s personal blog: https://synthesis.to/2021/03/03/flattening_detection.html. Commercial businesses and malware authors often use code obfuscation to protect specific code areas to impede reverse engineering.