Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Simulating Execution in Malicious Text Detection

Hack In The Box Security Conference via YouTube

Overview

Explore advanced techniques for malicious text detection in this conference talk from the Hack In The Box Security Conference. Dive into the limitations of static detection methods and the advantages of dynamic detection algorithms. Learn about code obfuscation techniques used by attackers to hinder feature extraction and the importance of simulating execution environments. Discover how dynamic detection can overcome challenges in syntax and lexical constraints, resulting in lower false positive rates. Examine the trade-offs between static and dynamic detection methods, including implementation costs, detection speed, and compatibility issues. Gain insights from experienced security researchers on cloud security, host security, and malicious text detection. Understand the complexities of developing text-based sandboxes for detecting webshells and malicious scripts. Explore emerging challenges in sandbox solutions, such as branch, time, and network confrontations.

Syllabus

#HITB2022SIN #COMMSEC Simulating Execution In Malicious Text Detection - S. Wang & Y Sun

Taught by

Hack In The Box Security Conference

Reviews

Start your review of Simulating Execution in Malicious Text Detection

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.