Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Slime - Automated Anti-Sandboxing Disarmament System

Black Hat via YouTube

Overview

Limited-Time Offer: Up to 75% Off Coursera Plus!
7000+ certificate courses from Google, Microsoft, IBM, and many more.
This course focuses on teaching an automated disarmament system for malware armed with anti-sandboxing techniques. The learning outcomes include understanding host-fingerprinting malware, armed malware with general anti-sandboxing, and the disarmament approach focusing on exit reasons and activity in malware execution. The course covers key technologies such as malware palpation, code execution integrity, and execution branch detection. The teaching method involves a presentation with statistics on evasive malware in the real world and analysis of large-scale samples. The intended audience for this course includes security engineers, malware analysts, and individuals interested in cybersecurity.

Syllabus

Intro
Contents
Background
Use the sandbox, Luke
Malware strike back
Related work
Motivation
Challenges
black hat
Chthonic anti-sandboxing
Type of anti-sandboxing
Environment awareness
Artifact fingerprinting
Execution environment fingerprinting
Execution timing detection
SLIME key technologies
Concept: malware palpatio
Malware palpation
Code Execution Integrity CEI
Execution branch detection
Retroactive condition analysis
Implementation
Execution logging framework
Camouflaging VM/sandbox related artifact existence
Disarming demo
Anti-VMWare
Sandbox evasion
Dataset
Are Anti-VM Too Few?
Offtopic: Artifact finding by Yara
Can Virtual Machine Protects You from Malware?
Conclusion

Taught by

Black Hat

Reviews

Start your review of Slime - Automated Anti-Sandboxing Disarmament System

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.