Reverse Engineering Mac MalwareThis is the first part of a series of posts reflecting the Security B Sides presentation
done by Sarah Edwards, experienced digital forensic analyst. The subject matter
includes an overview of tools and methods which are applicable to reverse
engineer the infections tailored for Mac. In particular, the presentation
covers file types and instruments in the context of static analysis as well as such
components of dynamic analysis as virtualization and application tracing, with some illustrations being provided along the way.
Source:
Reverse Engineering Mac Malware