Loading…
Utah’s Premiere Cyber Security Conference
Tuesday, October 22 • 2:00pm - 2:30pm
Reverse Engineering and Code Emulation with Ghidra

Sign up or log in to save this to your schedule, view media, leave feedback and see who's attending!

Feedback form is now closed.
The NSA recently open-sourced the Ghidra software reverse engineering tool. While it's unlikely to steal IDA-heads, Binjas, or those 5 people who remember Radare2's command line, it is a mature RE tool with a huge feature set. It's also easily extensible through Java, Python, and a command line batch mode. This talk will introduce Ghidra briefly, then demonstrate/release an open-source Ghidra intermediate language emulation capability, and finally describe the basics of extending Ghidra via Python scripting.

Speakers
avatar for Karl Sickendick

Karl Sickendick

US Air Force
Electrical Engineer, Computer Scientist, experienced cyber capability developer, Air Force Officer, recently assigned to Idaho National Labs as an Air Force Fellow


Tuesday October 22, 2019 2:00pm - 2:30pm MDT
Track ONE 2nd Floor (Ballroom A)