Overview
Explore a Black Hat conference presentation that delves into the challenges and solutions for analyzing Rust-based malware through Project 0xA11C (Oxalic). Learn how security researchers tackle the complexities introduced by Rust's programming features in malware analysis, drawing parallels from successful methodologies used with Go malware. Discover practical approaches and tools for making Rust reverse-engineering more accessible, with real-world examples from APT malware including RustDown, RustBucket, and Spica. Gain insights into how Rust's unique characteristics like memory safety, aggressive compiler optimizations, borrowing, and intricate types create complex abstractions that challenge traditional analysis methods. Follow along as researchers demonstrate how to overcome these obstacles and better understand the expanding Rust malware ecosystem through their developed methodology and tooling.
Syllabus
Project 0xA11C: Deoxidizing the Rust Malware Ecosystem
Taught by
Black Hat