shapesecurity ShapeSecurity's Javascript VM: Part 3 Intro Okay, now that we have finished talking about the VM Machinery in part 1 and the VM Data in part 2, we have finished the preliminary parts. It's time to delve deeper into the ops from OPS_FUNCTIONS. Diving Deeper Into the Ops The ops from ShapeSecurity&
shapesecurity ShapeSecurity's Javascript VM: Part 2 Intro In previous part, we talked about the VM Internals especifically about the VM Machinery. This second part we are going to talk about the VM Data and how they work together with the VM Machinery. VM Data The VM Data contains 11 data objects that are used as configuration
shapesecurity ShapeSecurity's Javascript VM: Part 1 Intro ShapeSecurity's Javascript Virtual Machine(VM) has a remarkable reputation for being extremely hard to bypass and reverse. Their primary clients consists of corporations that require the highest level of security when it comes to protecting their API endpoints. This sort of clientele represents a wide range of
supreme Pooky Control-Flow Flattening - Part 3 For Part 3 of this series, I'm going to pick up from where I left off. This means I will be going into detail over what the State, Ending State, Starting State, and Transitions are. Note: Read Part 1 and Part 2 to get solid foundation that will
supreme Pooky Control-Flow Flattening - Part 2 For Part 3 of this series, I'm going to pick up from where I left off. This means I will be going into detail over what the State, Ending State, Starting State, and Transitions are. Note: Read Part 1 and Part 2 to get solid foundation that will
supreme Pooky Control-Flow Flattening - Part 1 Nightmares from Pooky Switch Statements One of the scariest things that I noticed as soon as I opened Pooky and beautified it via Sublime, was the excessive amounts of For Loops with an inner Switch Statement as the only element in the body. Just looking at those Switch Cases for