PPT-SMT Solvers for Malware Unpacking

Author : stefany-barnette | Published Date : 2016-06-08

8 July 2013 Authors and thanks 2 Ian Blumenfeld Roberta Faux Paul Li Work overseen by Mark Raugas Director CyberPoint Labs Special thanks to Levent Erkok

Presentation Embed Code

Download Presentation

Download Presentation The PPT/PDF document "SMT Solvers for Malware Unpacking" is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.

SMT Solvers for Malware Unpacking: Transcript


8 July 2013 Authors and thanks 2 Ian Blumenfeld Roberta Faux Paul Li Work overseen by Mark Raugas Director CyberPoint Labs Special thanks to Levent Erkok for technical help with the SBV library. A Look at Cuckoo Sandbox. Introduction. What is Malware?. (. mãl'wâr. ') - . Malicious . computer software that interferes with normal computer . functions. What is Automated Malware Analysis?. Taking what has been done by highly skilled professionals in extremely time consuming tasks and making it, quick, easy and repeatable. Automated Malware Analysis is being touted as the “Next Generation Anti-Virus” solution.. Lecturer: . Qinsi. Wang. May 2, 2012. Z3. high-performance theorem . prover. being developed at Microsoft Research.. mainly by Leonardo de . Moura. and . Nikolaj. . Bjørner. . . Free (online interface, APIs, …) . To AMWG. June 16. , 2015. Status Update of AMWG Change . Requests. Status of AMWG Change Requests . 3. Summary: 42 . Total AMWG Change Requests . 9 . AMWG Change Requests . Delivered . 2014. 1 . AMWG Change . Newbies. A guide for those of you who want to break into the fun world of malware.. What We’re Going To Cover. Basic x86/64 ASM. Tools of the trade. Setting up an environment. Intro to the Debugger . Analysis. Part 4. Veronica Kovah. vkovah.ost. at . gmail. See notes for citation. 1. http://. opensecuritytraining.info. /. MalwareDynamicAnalysis.html. All . materials is licensed under . a Creative . Chapter 15: Anti-Disassembly. Chapter 16: Anti-Debugging. Chapter 17: Anti-Virtual Machine Techniques. Chapter 18: Packing and Unpacking. Chapter 15: . Anti-Disassembly. Anti-Disassembly. 1. Understanding Anti-Disassembly. Arithmetic Computations . in Embedded Software Code. Presented by: Kuldeep S. Meel. Adapted from slides by Hassan Eldib and Chao Wang (Virginia Tech). A Robotic Dream. Having a tool that automatically synthesizes the optimum version of a software program.. CS 598: Network Security. Michael Rogers & Leena Winterrowd. March 26, 2013. Types of Malware. Image courtesy of prensa.pandasecurity.com. Types of Malware. Viruses 16,82%. Trojan horses. 69.99%. To AMWG. MARCH 2015. 2. Monthly SMT Data Timeliness AMWG CR 2014 002. End to End File Processing Completeness – March 2015. % Timely Market Delivery. - % of files posted to market (FTPS) by 11:00pm out of # of files received by SMT by 11:00pm.. Guy Katz. Schloss. . Dagstuhl. , October 2016. Acknowledgements . Based on joint work with Clark Barrett, Cesare . Tinelli. , Andrew Reynolds and Liana . Hadarean. (. FMCAD’16. ). 2. Stanford . University. Preprocessing. Can . Efficiently. . Simulate. Resolution. Paul . Beame. *. . Ashish Sabharwal. . *. Computer Science and Engineering, University of Washington, Seattle, WA, USA. . Allen Institute for Artificial Intelligence, Seattle, WA, USA. Meltem Ozsoy. *. , Caleb . Donovick. *. , . Iakov. . Gorelik. *. ,. Nael. Abu-. Ghazaleh. **. and Dmitry . Ponomarev. *. *. Binghamton University, . **. University of California, Riverside. HPCA 2015 - San Francisco, CA. Newbies. A guide for those of you who want to break into the fun world of malware.. What We’re Going To Cover. Basic x86/64 ASM. Tools of the trade. Setting up an environment. Intro to the Debugger . VS Experiments 2008 . –. Toronto, Canada. Leonardo de Moura. Microsoft Research. Agenda. What is SMT?. Experiments:. Windows kernel verification.. Extending SMT solvers.. Garbage collector (Singularity) verification.

Download Document

Here is the link to download the presentation.
"SMT Solvers for Malware Unpacking"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.

Related Documents