Загрузка...

Agentic Reverse Engineering: How AI Agents Are Changing Binary Analysis

Speaker: Tim Blazytko

Part of Binary Cartography, a technical webinar series on reverse engineering, malware analysis, and software protection.

Slides, code, samples, and demo environment:
https://github.com/mrphrazer/binary-cartography/tree/main/2026-03-agentic_reverse_engineering

Binary Cartography series repository:
https://github.com/mrphrazer/binary-cartography

In this webinar, Tim Blazytko explores how agents are starting to reshape reverse engineering in practice. Moving beyond simple prompt-based assistance, agents can use tools, inspect binaries, follow workflows, and automate analysis steps that previously had to be driven manually. This creates a more iterative, workflow-driven way of approaching binary analysis.

The session introduces the core ideas behind this shift: what an agent is in a reverse-engineering setting, how agentic workflows differ from plain prompting, and what MCP, connected tools, and reusable skills enable in practice. After a brief orientation of the analysis environment, the webinar moves into live examples with Ghidra, showing how agents can analyze unknown binaries, recover structure, answer targeted questions, and support patching and cracking-style workflows.

Finally, the webinar looks at where agents already provide real value, where their current limits still are, and how structured workflows can turn shallow exploration into much more useful analysis. The goal is to show what agentic reverse engineering already makes possible today — and why it is changing the way we approach binaries.

Designed for technical security professionals, reverse engineers, and analysts with some familiarity with binaries and low-level software. No prior experience with agents or AI-driven workflows is required.

Видео Agentic Reverse Engineering: How AI Agents Are Changing Binary Analysis канала Tim Blazytko
Яндекс.Метрика
Все заметки Новая заметка Страницу в заметки
Страницу в закладки Мои закладки
На информационно-развлекательном портале SALDA.WS применяются cookie-файлы. Нажимая кнопку Принять, вы подтверждаете свое согласие на их использование.
О CookiesНапомнить позжеПринять