Completed
Detect Runtime Environment
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Full System Emulation - Achieving Successful Automated Dynamic Analysis of Evasive Malware
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 What are we talking about?
- 3 Evolution of Malware
- 4 What do we want to monitor?
- 5 VM Approach versus CPU Emulation
- 6 Dynamic Analysis Approaches
- 7 Our Automated Malware Analysis
- 8 Visibility Does Matter
- 9 Detecting Keyloggers
- 10 Supporting Static Analysis
- 11 Detect Runtime Environment
- 12 Detect Analysis Engine
- 13 Avoid Monitoring
- 14 What can we do about evasion?
- 15 Bypassing Triggers
- 16 Combating Evasion
- 17 Passive Mode
- 18 Active Mode
- 19 Evasion in a Broader Context
- 20 Conclusions