Главная
Study mode:
on
1
Introduction
2
Excel 4 Macros
3
How they work
4
Mouse and Audio
5
Evasion
6
Char Function
7
Register Function
8
Symbolic Execution Example
9
Introduction to Symbolic Execution
10
Concrete Analysis
11
Concrete Analysis Problem
12
Architecture
13
Loader
14
Simulation Manager
15
Environment and constraints
16
Step function
17
Examples
18
Malicious Excel sample analysis
19
Why deobfuscate a sample
20
Evaluation
21
Conclusion
Description:
Explore a 35-minute Black Hat conference presentation on Symbexcel, a new tool implementing Symbolic Execution for Excel 4.0 macros. Dive into the world of cybersecurity as experts Giovanni Vigna, Nicola Ruaro, Fabio Pagani, and Stefano Ortolani discuss how this innovative approach combats malicious macros. Learn about the challenges in detecting these attack vectors, the limitations of current security measures, and how Symbexcel's plugins support the analysis of highly obfuscated and evasive samples. Gain insights into Excel 4 macro functionality, evasion techniques, and the principles of Symbolic Execution. Discover the tool's architecture, including its loader, simulation manager, and step function. Understand the importance of deobfuscating malicious samples and evaluate the effectiveness of this cutting-edge cybersecurity solution.

Bringing the Power of Symbolic Execution to the Fight Against Malicious Excel 4 Macros

Black Hat
Add to list