PPT-Trends in Circumventing Web-Malware Detection
Author : giovanna-bartolotta | Published Date : 2016-03-02
UTSA Moheeb Abu Rajab Lucas Ballard Nav Jagpal Panayiotis Mavrommatis Daisuke Nojiri Niels Provos Ludwig Schmidt Present by Li Xu 2 Detecting Malicious Web Sites
Presentation Embed Code
Download Presentation
Download Presentation The PPT/PDF document "Trends in Circumventing Web-Malware Dete..." is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
Trends in Circumventing Web-Malware Detection: Transcript
UTSA Moheeb Abu Rajab Lucas Ballard Nav Jagpal Panayiotis Mavrommatis Daisuke Nojiri Niels Provos Ludwig Schmidt Present by Li Xu 2 Detecting Malicious Web Sites Which pages are safe URLs for end users. 2012 . IEEE/IPSJ 12. th. . International . Symposium on Applications and the . Internet. 102062596 . 陳盈妤. 1. /10. Outline. Introduction of proposed method. Previous works by catching random behavior. Sophisticated Criminals or . Babytown. Frolics?. Ryan Merritt. Josh Grunzweig. Who We Are. Josh Grunzweig. Security Researcher. Malware Reverser. Dabbles in Ruby. Homebrewer. Ryan Merritt. Security Researcher. Connor Schnaith, Taiyo Sogawa. 9 April 2012. Motivation. “. 5. 000 . new. malware samples per day”. --David Perry of Trend Micro. Large variance between attacks. Polymorphic attacks . Perform the same function. CS 598: Network Security. Michael Rogers & Leena Winterrowd. March 26, 2013. Types of Malware. Image courtesy of prensa.pandasecurity.com. Types of Malware. Viruses 16,82%. Trojan horses. 69.99%. Chapter 11: Malware Behavior. Chapter 12: Covert Malware Launching. Chapter 13: Data Encoding. Chapter 14: Malware-focused Network Signatures. Chapter 11: Malware . Behavior. Common functionality. Downloaders. A Look at Cuckoo Sandbox. Introduction. What is Malware?. (. mãl'wâr. ') - . Malicious . computer software that interferes with normal computer . functions. What is Automated Malware Analysis?. Taking what has been done by highly skilled professionals in extremely time consuming tasks and making it, quick, easy and repeatable. Automated Malware Analysis is being touted as the “Next Generation Anti-Virus” solution.. Suman Jana and Vitaly Shmatikov. The University of Texas at Austin. All about sophisticated detection and evasion techniques. Polymorphism, metamorphism, obfuscation… . Modern malware research. All about sophisticated detection and evasion techniques. with . DroidRide. : And How Not To. Min Huang, Kai Bu, . Hanlin. Wang, . Kaiwen. Zhu. Zhejiang University. CyberC. 2016. Reviving Android Malware. with . DroidRide. : And How Not To. ?. Reviving Android Malware. . malware. . detection. . mechanisms. in online banking. Jakub Kałużny. Mateusz Olejarka. CONFidence. , 25.05.2015. Pentesters. @ SecuRing. Ex-. developers. Experience. with:. E-banking and mobile banking . Meltem Ozsoy. *. , Caleb . Donovick. *. , . Iakov. . Gorelik. *. ,. Nael. Abu-. Ghazaleh. **. and Dmitry . Ponomarev. *. *. Binghamton University, . **. University of California, Riverside. HPCA 2015 - San Francisco, CA. Spam:. Spam is unsolicited or undesired electronic junk mail. Characteristics of spam are:. Mass . mailing to large number of recipients. Usually a commercial advertisement. Annoying but usually harmless unless coupled with a fraud based phishing scam . Based on slides from Computer Security: Principles and Practices by William Stallings and Lawrie Brown. CSC230: C and Software Tools © NC State University Computer Science Faculty. 1. Malware. [SOUP13] defines malware as:. Malware. Vitor M. . Afonso, . Dario S. Fernandes . Filho, . André . R. A. . Grégio1. , PauloL.de Geus, . Mario . Jino. Contents. Introduction. Related work. System Description. Tests. Results. Conclusion And Future Work. A. ttacks. Vaibhav . Rastogi. , . Yan Chen. , and . Xuxian. Jiang. 1. Lab for Internet and Security Technology, Northwestern University. †. North Carolina State University. Android Dominance. Smartphone sales already exceed PC sales.
Download Document
Here is the link to download the presentation.
"Trends in Circumventing Web-Malware Detection"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.
Related Documents