Spotless Sandboxes: Evading Malware Analysis Systems Using Wear-and-Tear Artifacts

Spotless Sandboxes: Evading Malware Analysis Systems Using Wear-and-Tear Artifacts

IEEE Symposium on Security and Privacy via YouTube Direct link

Current Evasion Techniques

6 of 17

6 of 17

Current Evasion Techniques

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Spotless Sandboxes: Evading Malware Analysis Systems Using Wear-and-Tear Artifacts

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Outline
  3. 3 Automation
  4. 4 Dynamic Analysis Techniques
  5. 5 The Environment
  6. 6 Current Evasion Techniques
  7. 7 Intuition Behind It
  8. 8 Features
  9. 9 Data Collection
  10. 10 Limitations
  11. 11 Methodology
  12. 12 Real Systems
  13. 13 Registry artifacts
  14. 14 Decision tree model
  15. 15 Evaluation
  16. 16 Claim Age
  17. 17 Content Measure

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.