Completed
Evolution of a malware family
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Harnessing Intelligence From Malware Repositories
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Welcome
- 3 Cybersecurity Disconnect
- 4 Jeff Moss
- 5 The economics of developing malware
- 6 Finding connections between malware
- 7 Google for Malware
- 8 The Challenge
- 9 VM Inversion
- 10 Semantic Fingerprint
- 11 Code Obfuscation
- 12 Code Normalization
- 13 Map to Code
- 14 Semantic Juice
- 15 Creating Indexes
- 16 Architecture
- 17 Results
- 18 Case Study
- 19 Unpacking
- 20 True Intelligence
- 21 Semantic Hashing
- 22 The beauty of semantic hashes
- 23 The impact of semantic hashes
- 24 Evolution of a malware family
- 25 Summary
- 26 Questions