PPT-Integrity & Malware

Author : kittie-lecroy | Published Date : 2015-09-26

Dan Fleck CS469 Security Engineering Some of the slides are modified with permission from Quan Jia Coming up Integrity Who Cares 1 1 Integrity Who Cares I ARPA

Presentation Embed Code

Download Presentation

Download Presentation The PPT/PDF document "Integrity & Malware" is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.

Integrity & Malware: Transcript


Dan Fleck CS469 Security Engineering Some of the slides are modified with permission from Quan Jia Coming up Integrity Who Cares 1 1 Integrity Who Cares I ARPA Funded GMU and others to research software validation. Author : . Yajin. Zhou, . Xuxuan. Jiang. TJ. Index of this paper. Introduction. Malware Timeline. Malware Characterization. Malware Installation. Repackaging. Update Attack. Drive-by Download. Others. Sophisticated Criminals or . Babytown. Frolics?. Ryan Merritt. Josh Grunzweig. Who We Are. Josh Grunzweig. Security Researcher. Malware Reverser. Dabbles in Ruby. Homebrewer. Ryan Merritt. Security Researcher. Newbies. A guide for those of you who want to break into the fun world of malware.. What We’re Going To Cover. Basic x86/64 ASM. Tools of the trade. Setting up an environment. Intro to the Debugger . Connor Schnaith, Taiyo Sogawa. 9 April 2012. Motivation. “. 5. 000 . new. malware samples per day”. --David Perry of Trend Micro. Large variance between attacks. Polymorphic attacks . Perform the same function. Analysis. Part 4. Veronica Kovah. vkovah.ost. at . gmail. See notes for citation. 1. http://. opensecuritytraining.info. /. MalwareDynamicAnalysis.html. All . materials is licensed under . a Creative . CS 598: Network Security. Michael Rogers & Leena Winterrowd. March 26, 2013. Types of Malware. Image courtesy of prensa.pandasecurity.com. Types of Malware. Viruses 16,82%. Trojan horses. 69.99%. Chapter 11: Malware Behavior. Chapter 12: Covert Malware Launching. Chapter 13: Data Encoding. Chapter 14: Malware-focused Network Signatures. Chapter 11: Malware . Behavior. Common functionality. Downloaders. CS 598: Network Security. Michael Rogers & Leena Winterrowd. March 26, 2013. Types of Malware. Image courtesy of prensa.pandasecurity.com. Types of Malware. Viruses 16,82%. Trojan horses. 69.99%. Jeremy . Blackthorne. , Benjamin Kaiser, . Benjamin Fuller. , and Bulent . Yener. Contribution. Malware changes behavior by observing environment to avoid analysis. Complementary technique to obfuscation. Erdal Ozkaya . Raymond Comvalius. CISO . Infrastructure Architect. Emt. Holding . NEXTXPERT. Module Agenda. First response at a malware attack. Recognizing. malware. Identifying. Nael Abu-Ghazaleh. Joint work with Khaled . Khasawneh. , Dmitry . Ponomarev. and Lei Yu. Malware is Everywhere!. Malware is Everywhere!. Over 250,000 malware registered every day! . Hardware Malware Detectors (HMDs). Online Ba n king Channels T he t h r e a t – DYRE and GOZI Trojan malware :  While neither threat is new, s ecurity analysts have detected a recent rise in fraud attempts using two variants of Chien-Chung Shen. cshen. @udel.edu. Malware. NIST . defines malware as:. “. a program that is inserted into a system, . usually covertly. , . with the . intent of compromising the confidentiality, integrity, . Software that is specifically designed to disturb, damage, or gain unauthorized access to a computer system.. These software are generally made for :. Stealing, encrypting, or deleting data. Altering or hijacking computing functions.

Download Document

Here is the link to download the presentation.
"Integrity & Malware"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.

Related Documents