Full System Emulation - Achieving Successful Automated Dynamic Analysis of Evasive Malware

Full System Emulation - Achieving Successful Automated Dynamic Analysis of Evasive Malware

Black Hat via YouTube Direct link

Intro

1 of 20

1 of 20

Intro

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Full System Emulation - Achieving Successful Automated Dynamic Analysis of Evasive Malware

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 What are we talking about?
  3. 3 Evolution of Malware
  4. 4 What do we want to monitor?
  5. 5 VM Approach versus CPU Emulation
  6. 6 Dynamic Analysis Approaches
  7. 7 Our Automated Malware Analysis
  8. 8 Visibility Does Matter
  9. 9 Detecting Keyloggers
  10. 10 Supporting Static Analysis
  11. 11 Detect Runtime Environment
  12. 12 Detect Analysis Engine
  13. 13 Avoid Monitoring
  14. 14 What can we do about evasion?
  15. 15 Bypassing Triggers
  16. 16 Combating Evasion
  17. 17 Passive Mode
  18. 18 Active Mode
  19. 19 Evasion in a Broader Context
  20. 20 Conclusions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.