Главная
Study mode:
on
1
Intro
2
What are we talking about?
3
Evolution of Malware
4
What do we want to monitor?
5
VM Approach versus CPU Emulation
6
Dynamic Analysis Approaches
7
Our Automated Malware Analysis
8
Visibility Does Matter
9
Detecting Keyloggers
10
Supporting Static Analysis
11
Detect Runtime Environment
12
Detect Analysis Engine
13
Avoid Monitoring
14
What can we do about evasion?
15
Bypassing Triggers
16
Combating Evasion
17
Passive Mode
18
Active Mode
19
Evasion in a Broader Context
20
Conclusions
Description:
Explore full system emulation techniques for successful automated dynamic analysis of evasive malware in this Black Hat conference talk. Delve into the challenges faced by forensics experts and anti-malware solutions when extracting information from malicious files. Learn about dynamic analysis (sandboxing) methods for identifying suspicious behaviors and assessing risks associated with running malware samples. Discover the evolving techniques used by attackers to evade or complicate analysis, and gain insights into designing effective dynamic analysis systems. Compare externally instrumented full-system emulation with other approaches like OS emulation and traditional virtualization. Examine real-world examples of evasion techniques, including environment triggers, stalling code, and human interaction detection. Uncover solutions enabled by full system emulation, such as detecting environment-dependent branching, circumventing detection attempts, and mitigating stalling code blocks. Gain valuable knowledge on identifying and bypassing human behavior detection attempts, enhancing your ability to analyze and combat sophisticated malware. Read more

Full System Emulation - Achieving Successful Automated Dynamic Analysis of Evasive Malware

Black Hat
Add to list
0:00 / 0:00