Ярослав Гороховик

Reverse Engineer at Check Point Software Technologies, Минск, Беларусь

Security Researcher at Check Point Research. Used to work as a C++ Developer. Worked on industrial automation and cyber security products. Currently utilizes his skills in malware analysis and security research.


Anti-Analysis Tricks in C/C++: How to screw up reverse engineering of your programs

2020 Spring

Malware often use different Anti-Analysis approaches to deceive a disassembler, detect a debugger or just make the analysis unbearable either with a disassembler or a debugger. However these techniques are …