Please create an account to participate in the Slashdot moderation system

 



Forgot your password?
typodupeerror
×
Worms Security IT

Inside The First Pocket PC Trojan 8

fogez writes "This tutorial shows you how to reverse engineer a new example of Windows Mobile malware - step by step. Included are methods for background research and even include a fully annotated IDA disassembly of the ARM binary. We hope that this tutorial will inspire others to enter the exciting field of reverse engineering embedded malware."
This discussion has been archived. No new comments can be posted.

Inside The First Pocket PC Trojan

Comments Filter:

Parts that positively cannot be assembled in improper order will be.

Working...