Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Full System Emulation - Achieving Successful Automated Dynamic Analysis of Evasive Malware

Black Hat via YouTube

Overview

Limited-Time Offer: Up to 75% Off Coursera Plus!
7000+ certificate courses from Google, Microsoft, IBM, and many more.
This course aims to teach learners how to achieve successful automated dynamic analysis of evasive malware. The learning outcomes include understanding the challenges faced by forensics experts and anti-malware solutions, designing dynamic analysis systems, identifying evasion techniques, and implementing solutions using full system emulation. The course covers skills such as detecting environment triggers, stalling code, and human interaction, as well as bypassing evasion techniques. The teaching method involves a presentation by an industry expert, with demonstrations and examples of evasion techniques observed in the wild. The intended audience for this course includes cybersecurity professionals, malware analysts, and individuals interested in dynamic malware analysis.

Syllabus

Intro
What are we talking about?
Evolution of Malware
What do we want to monitor?
VM Approach versus CPU Emulation
Dynamic Analysis Approaches
Our Automated Malware Analysis
Visibility Does Matter
Detecting Keyloggers
Supporting Static Analysis
Detect Runtime Environment
Detect Analysis Engine
Avoid Monitoring
What can we do about evasion?
Bypassing Triggers
Combating Evasion
Passive Mode
Active Mode
Evasion in a Broader Context
Conclusions

Taught by

Black Hat

Reviews

Start your review of Full System Emulation - Achieving Successful Automated Dynamic Analysis of Evasive Malware

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.