Breaking Obfuscated .NET Malware with Profiler-Based Dynamic Binary Instrumentation
Lars Wallenborn, Steffen Haas, Tillmann Werner, Lindsay Kaye
REcon 2025 · Day 3 · Main Track
.NET malware is increasingly obfuscated with commodity protectors that embed runtime integrity checks—checks that detect and defeat the standard analyst trick of calling string decryption functions di
AI review
Four researchers weaponized the .NET Profiler API to bypass stack-checking obfuscation at scale — the architecture is clever, the demos deliver, and the tooling gap it fills is real.