Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Worms Security IT

Inside The First Pocket PC Trojan 8

fogez writes "This tutorial shows you how to reverse engineer a new example of Windows Mobile malware - step by step. Included are methods for background research and even include a fully annotated IDA disassembly of the ARM binary. We hope that this tutorial will inspire others to enter the exciting field of reverse engineering embedded malware."
This discussion has been archived. No new comments can be posted.

Inside The First Pocket PC Trojan

Comments Filter:

We must believe that it is the darkest before the dawn of a beautiful new world. We will see it when we believe it. -- Saul Alinsky

Working...