The Irrelevance of K-Bytes Detection - Building a Robust Pipeline for Malicious Documents

The Irrelevance of K-Bytes Detection - Building a Robust Pipeline for Malicious Documents

Black Hat via YouTube Direct link

File Formats

4 of 18

4 of 18

File Formats

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

The Irrelevance of K-Bytes Detection - Building a Robust Pipeline for Malicious Documents

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Agenda
  3. 3 Problem Space
  4. 4 File Formats
  5. 5 Click Rates
  6. 6 Web Browsing Security
  7. 7 Mail vs Web
  8. 8 Document Analysis Pipeline
  9. 9 Evaluation Criteria
  10. 10 File Type Detection
  11. 11 Problems with File Type Detection
  12. 12 Webpage Example
  13. 13 Sandbox
  14. 14 CDLs
  15. 15 Remote Viewing
  16. 16 RealTime Pipeline
  17. 17 Offline Pipeline
  18. 18 Summary

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.