PPT-Analysis of Mixed-mode Malware

Author : berey | Published Date : 2024-02-09

Christoph Csallner University of Texas at Arlington httprangerutaeducsallner Joint work with Shabnam Aboughadareh This material is based upon work supported

Presentation Embed Code

Download Presentation

Download Presentation The PPT/PDF document "Analysis of Mixed-mode Malware" is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.

Analysis of Mixed-mode Malware: Transcript


Christoph Csallner University of Texas at Arlington httprangerutaeducsallner Joint work with Shabnam Aboughadareh This material is based upon work supported by the National Science Foundation under Grants No 1017305 1117369 and 1527398 Any opinions findings and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation. Sophisticated Criminals or . Babytown. Frolics?. Ryan Merritt. Josh Grunzweig. Who We Are. Josh Grunzweig. Security Researcher. Malware Reverser. Dabbles in Ruby. Homebrewer. Ryan Merritt. Security Researcher. Newbies. A guide for those of you who want to break into the fun world of malware.. What We’re Going To Cover. Basic x86/64 ASM. Tools of the trade. Setting up an environment. Intro to the Debugger . Connor Schnaith, Taiyo Sogawa. 9 April 2012. Motivation. “. 5. 000 . new. malware samples per day”. --David Perry of Trend Micro. Large variance between attacks. Polymorphic attacks . Perform the same function. CS 598: Network Security. Michael Rogers & Leena Winterrowd. March 26, 2013. Types of Malware. Image courtesy of prensa.pandasecurity.com. Types of Malware. Viruses 16,82%. Trojan horses. 69.99%. Chapter 11: Malware Behavior. Chapter 12: Covert Malware Launching. Chapter 13: Data Encoding. Chapter 14: Malware-focused Network Signatures. Chapter 11: Malware . Behavior. Common functionality. Downloaders. 2013 international conference on computing , networking and communications, communications and information security symposium. Author : . Saeed. . Nari. , Ali A. . Ghorbani. . /17. 1. Speaker : Wen Lin Yu . A Look at Cuckoo Sandbox. Introduction. What is Malware?. (. mãl'wâr. ') - . Malicious . computer software that interferes with normal computer . functions. What is Automated Malware Analysis?. Taking what has been done by highly skilled professionals in extremely time consuming tasks and making it, quick, easy and repeatable. Automated Malware Analysis is being touted as the “Next Generation Anti-Virus” solution.. with . DroidRide. : And How Not To. Min Huang, Kai Bu, . Hanlin. Wang, . Kaiwen. Zhu. Zhejiang University. CyberC. 2016. Reviving Android Malware. with . DroidRide. : And How Not To. ?. Reviving Android Malware. CS 598: Network Security. Michael Rogers & Leena Winterrowd. March 26, 2013. Types of Malware. Image courtesy of prensa.pandasecurity.com. Types of Malware. Viruses 16,82%. Trojan horses. 69.99%. Spam:. Spam is unsolicited or undesired electronic junk mail. Characteristics of spam are:. Mass . mailing to large number of recipients. Usually a commercial advertisement. Annoying but usually harmless unless coupled with a fraud based phishing scam . and. Content Theft & Malware . Investigative Findings. 30%. 11.8. MILLION. U.S. users exposed to malware each month by sites in the sample content theft group. 1 in 3 content theft sites exposed users to malware . Grace. M, Zhou. Y, . Shilong. . Z, Jiang. . X. RiskRanker. analyses the paths within an android application. Potentially malicious security risks are flagged for investigation. Summary. This application showcases how reverse engineering. Analysts. “Decrease exposure time from . d. etection to . e. radication”. Garrett Schubert – EMC Corporation. Critical Incident Response Center. Incident Response\Content Lead. Surgery on the front lines. between the different modes Many commercially While it may be possible to test the instruments destined for accuracy in absolute andpredictable terms the market and social researchers instruments can

Download Document

Here is the link to download the presentation.
"Analysis of Mixed-mode Malware"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.

Related Documents