![](https://ccweb.imgix.net/https%3A%2F%2Fwww.classcentral.com%2Fimages%2Ficon-black-friday.png?auto=format&ixlib=php-4.1.0&s=fe56b83c82babb2f8fce47a2aed2f85d)
Overview
![](https://ccweb.imgix.net/https%3A%2F%2Fwww.classcentral.com%2Fimages%2Ficon-black-friday.png?auto=format&ixlib=php-4.1.0&s=fe56b83c82babb2f8fce47a2aed2f85d)
This course aims to teach learners how to achieve successful automated dynamic analysis of evasive malware. The learning outcomes include understanding the challenges faced by forensics experts and anti-malware solutions, designing dynamic analysis systems, identifying evasion techniques, and implementing solutions using full system emulation. The course covers skills such as detecting environment triggers, stalling code, and human interaction, as well as bypassing evasion techniques. The teaching method involves a presentation by an industry expert, with demonstrations and examples of evasion techniques observed in the wild. The intended audience for this course includes cybersecurity professionals, malware analysts, and individuals interested in dynamic malware analysis.
Syllabus
Intro
What are we talking about?
Evolution of Malware
What do we want to monitor?
VM Approach versus CPU Emulation
Dynamic Analysis Approaches
Our Automated Malware Analysis
Visibility Does Matter
Detecting Keyloggers
Supporting Static Analysis
Detect Runtime Environment
Detect Analysis Engine
Avoid Monitoring
What can we do about evasion?
Bypassing Triggers
Combating Evasion
Passive Mode
Active Mode
Evasion in a Broader Context
Conclusions
Taught by
Black Hat