Overview
Explore the intricacies of Linux malware in this 19-minute conference talk presented at the 2018 IEEE Symposium on Security & Privacy. Delve into the challenges posed by the increasing adoption of embedded devices and the IoT revolution, which have led to a shift in the malware landscape. Examine the unique characteristics of Linux-based systems and their impact on malware development. Learn about the first comprehensive study aimed at characterizing, analyzing, and understanding Linux malware. Discover the design and implementation of a specialized malware analysis pipeline tailored for Linux systems. Gain insights from a large-scale measurement study conducted on over 10,000 malware samples collected over a year. Explore topics such as diversity, portability, address mismatch, analysis infrastructure, data collection, and various analysis tools including Upx and dynamic analysis techniques. Understand the importance of feedback loops, deception detection, and attention to tiny details in malware analysis. Conclude with a Q&A session to further expand your knowledge on this critical aspect of cybersecurity.
Syllabus
Introduction
Diversity
Portability
Address mismatch
Analysis infrastructure
Data collection
Diversity problem
Analysis Tools
Upx
Dynamic Analysis
Feedback Loop
Deception
Detection
Rename
Detected
Tiny details
Conclusion
Questions
Taught by
IEEE Symposium on Security and Privacy