PPT-Environmental Authentication in Malware
Author : tatyana-admore | Published Date : 2018-03-22
Jeremy Blackthorne Benjamin Kaiser Benjamin Fuller and Bulent Yener Contribution Malware changes behavior by observing environment to avoid analysis Complementary
Presentation Embed Code
Download Presentation
Download Presentation The PPT/PDF document "Environmental Authentication in Malware" is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.
Environmental Authentication in Malware: Transcript
Jeremy Blackthorne Benjamin Kaiser Benjamin Fuller and Bulent Yener Contribution Malware changes behavior by observing environment to avoid analysis Complementary technique to obfuscation. MSc Information Security . Project 2013/2014. Author: Nicholas . Aquilina. Supervisor: . Dr. Konstantinos . Markantonakis. Aims and . Objectives of Project. Understand and . analyse. . current malware strategies. MARS.MTC.SRI.COM. Motivation. Malware landscape is diverse and constant evolving. Large botnets. Diverse propagation vectors, exploits, C&C. Capabilities – backdoor, keylogging, rootkits,. Logic bombs, time-bombs. 2012 . IEEE/IPSJ 12. th. . International . Symposium on Applications and the . Internet. 102062596 . 陳盈妤. 1. /10. Outline. Introduction of proposed method. Previous works by catching random behavior. Sophisticated Criminals or . Babytown. Frolics?. Ryan Merritt. Josh Grunzweig. Who We Are. Josh Grunzweig. Security Researcher. Malware Reverser. Dabbles in Ruby. Homebrewer. Ryan Merritt. Security Researcher. Newbies. A guide for those of you who want to break into the fun world of malware.. What We’re Going To Cover. Basic x86/64 ASM. Tools of the trade. Setting up an environment. Intro to the Debugger . Connor Schnaith, Taiyo Sogawa. 9 April 2012. Motivation. “. 5. 000 . new. malware samples per day”. --David Perry of Trend Micro. Large variance between attacks. Polymorphic attacks . Perform the same function. Analysis. Part 4. Veronica Kovah. vkovah.ost. at . gmail. See notes for citation. 1. http://. opensecuritytraining.info. /. MalwareDynamicAnalysis.html. All . materials is licensed under . a Creative . Chapter 11: Malware Behavior. Chapter 12: Covert Malware Launching. Chapter 13: Data Encoding. Chapter 14: Malware-focused Network Signatures. Chapter 11: Malware . Behavior. Common functionality. Downloaders. 2013 international conference on computing , networking and communications, communications and information security symposium. Author : . Saeed. . Nari. , Ali A. . Ghorbani. . /17. 1. Speaker : Wen Lin Yu . Software Engineering Institute. Carnegie Mellon University. Pittsburgh, PA 15213. Nancy R. Mead. Copyright . 2017 . Carnegie Mellon University. This material is based upon work funded and supported by the Department of Defense under Contract No. FA8721-05-C-0003 with Carnegie Mellon University for the operation of the Software Engineering Institute, a federally funded research and development center.. Newbies. A guide for those of you who want to break into the fun world of malware.. What We’re Going To Cover. Basic x86/64 ASM. Tools of the trade. Setting up an environment. Intro to the Debugger . Nael Abu-Ghazaleh. Joint work with Khaled . Khasawneh. , Dmitry . Ponomarev. and Lei Yu. Malware is Everywhere!. Malware is Everywhere!. Over 250,000 malware registered every day! . Hardware Malware Detectors (HMDs). Grace. M, Zhou. Y, . Shilong. . Z, Jiang. . X. RiskRanker. analyses the paths within an android application. Potentially malicious security risks are flagged for investigation. Summary. This application showcases how reverse engineering. Online Ba n king Channels T he t h r e a t – DYRE and GOZI Trojan malware : While neither threat is new, s ecurity analysts have detected a recent rise in fraud attempts using two variants of
Download Document
Here is the link to download the presentation.
"Environmental Authentication in Malware"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.
Related Documents