Challenges in Malware Analysis

1 676
25.4
Следующее
28.07.16 – 83348:24
The Margulis expanders
Популярные
Опубликовано 28 июля 2016, 1:16
Program analysis is a challenging task when source code is available. It is even more challenging when analyzing malware where neither the source code nor debug information are present. Malware authors often employ a myriad of evasion techniques to impede automated reverse engineering and static analysis efforts of their binaries. This makes it challenging to uncover the malware intent and the full spectrum of embedded capabilities. In this presentation, we review the main challenges when analyzing binary programs and explore techniques for recovery of information that allows program understanding and reverse-engineering. In particular, we describe a set of techniques for automatically unrolling the impact of code obfuscators with the objective of completely recovering the original malware logic. We will describe obfuscation strategies employed by infamous malware instances such as Conficker C, Hydraq (the binary associated with the Google attack), and Stuxnet.
Случайные видео
235 дней – 109 5987:16
Adam Savage's New Mini Pry Bars
05.07.10 – 189 91220:22
Droid X vs. EVO 4G: Round 1
автотехномузыкадетское