Главная
Study mode:
on
1
Introduction
2
Welcome
3
Cybersecurity Disconnect
4
Jeff Moss
5
The economics of developing malware
6
Finding connections between malware
7
Google for Malware
8
The Challenge
9
VM Inversion
10
Semantic Fingerprint
11
Code Obfuscation
12
Code Normalization
13
Map to Code
14
Semantic Juice
15
Creating Indexes
16
Architecture
17
Results
18
Case Study
19
Unpacking
20
True Intelligence
21
Semantic Hashing
22
The beauty of semantic hashes
23
The impact of semantic hashes
24
Evolution of a malware family
25
Summary
26
Questions
Description:
Explore the untapped potential of malware repositories for intelligence gathering in this 55-minute Black Hat conference talk. Delve into innovative methods for extracting connections between malware samples, despite deceptive techniques employed by creators. Learn about a scalable approach combining formal program analysis and data mining to search large-scale repositories for forensic evidence. Discover VirusBattle, a cloud-based malware analysis web service, and examine empirical evidence supporting the viability of mining malware repositories for meaningful insights. Gain valuable knowledge on topics such as semantic fingerprinting, code normalization, and semantic hashing, and understand their impact on tracking malware evolution and drawing connections between seemingly disparate cyber attacks.

Harnessing Intelligence From Malware Repositories

Black Hat
Add to list
0:00 / 0:00