Summary
1. Cryptominers Analysis and Detection
Modules Instructions analytics/metrics
WebAssembly Cryptominers
Exercise #1 (Coinhive analysis)
Exercise #2 (Cryptoloot analysis)
Cryptominer Detection Techniques
Exercise #3 (YARA rules)
2. Dynamic Module Analysis
Dynamic Binary Instrumentation (DBI)
CTF challenge #1
Reversing DBI hooks
Tracing WebAssembly Execution
3. Anti-Debugging & (De)Obfuscation Techniques
Anti-debugging Techniques
Bytecode Obfuscation
Bytecode De-Obfuscation
Real-life Module Analysis
4. Advanced Analysis Techniques
Static Single Assignment
Decompilation
CTF challenge #2
Symbolic Execution
5. Hacking WebAssembly Video Games
Hacking WebAssembly Games
Exercise #1
Exercise #2
Exercise #3