Главная
Study mode:
on
1
Intro
2
Outline
3
Office documents
4
JavaScript
5
Information Theory
6
Entropy
7
Interstellar
8
Coin Flip
9
Redundancy
10
Analyzing Malware
11
Analyzing Other Malware
12
Zero Order Random Process
13
Second Order Random Process
14
Third Order Random Process
15
Second Order Word Approximation
16
Malware
17
Entry Score
18
Edit Customer
19
Show All Customers
20
Cool Moments
21
Module Entropy
22
Static Signature
23
What transcends language
24
First names
25
Second names
26
Math
27
User Agent
28
Blue Team
Description:
Explore the concept of entropy in obfuscated code through this 36-minute conference talk from BSides Cleveland 2015. Delve into topics such as information theory, analyzing malware, and various random processes. Learn about module entropy, static signatures, and their implications for both offensive and defensive cybersecurity. Gain insights into how entropy analysis can be applied to different types of files, including office documents and JavaScript. Discover practical applications of these concepts in real-world scenarios, from malware detection to understanding user agents and blue team strategies.

The Entropy of Obfuscated Code

Add to list
0:00 / 0:00