Generating YARA Rules by Classifying Malicious Byte Sequences

Generating YARA Rules by Classifying Malicious Byte Sequences

Black Hat via YouTube Direct link

model training - top-k selection

7 of 12

7 of 12

model training - top-k selection

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Generating YARA Rules by Classifying Malicious Byte Sequences

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 intro & motivation
  3. 3 making an interpretable model
  4. 4 stacking convolutions
  5. 5 how the model works
  6. 6 model training - finding needles in a haystack
  7. 7 model training - top-k selection
  8. 8 training the model fitting onto a su
  9. 9 training the model - reducing FPS
  10. 10 signature generation - in bulk
  11. 11 signature efficacy
  12. 12 future work

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.