Overview
Syllabus
Intro
Contents
Background
Use the sandbox, Luke
Malware strike back
Related work
Motivation
Challenges
black hat
Chthonic anti-sandboxing
Type of anti-sandboxing
Environment awareness
Artifact fingerprinting
Execution environment fingerprinting
Execution timing detection
SLIME key technologies
Concept: malware palpatio
Malware palpation
Code Execution Integrity CEI
Execution branch detection
Retroactive condition analysis
Implementation
Execution logging framework
Camouflaging VM/sandbox related artifact existence
Disarming demo
Anti-VMWare
Sandbox evasion
Dataset
Are Anti-VM Too Few?
Offtopic: Artifact finding by Yara
Can Virtual Machine Protects You from Malware?
Conclusion
Taught by
Black Hat