28 Sep 2021, 18:45pm
The Go language is increasingly used by malware authors, and its binaries cannot be tackled with the usual approach. This combination makes Go malware a tough nut to crack for a reverse engineer. In his ‘Zero-knowledge Go Reverse-engineering’ workshop Ivan Kwiatkowski, Kaspersky’s senior security researcher, shares his experience in dissecting Go binaries and demonstrates how to analyze a real life malware sample.
Create an account to view all free webinars