Overview
Syllabus
Intro
Creeper and Reaper (1971)
Brain (1986)
Concept (1995)
Blaster (2003)
Stuxnet (2010)
History of Malware Evasion
Growth of Evasive Malware
Morris Worm (1988)
Polymorphic Viruses (1990's)
Blue Pill (2006) - Joanna Rutkowska
lot Worm (2016) - Ronen, O'Flynn, Shamir, Weingarten
Malware Detection Techniques
Malware Evasion - Static
Malware Evasion - Dynamic
Categories of Motive
Motive: Proof of Concept
Creeper (1971) – Bob Thomas
Motive: Destructive
CIH (1998)
Motive: Profit
Motive: Cyber Operations
Malware and lot
Prediction: Malware will evade anti-malware