Главная
Study mode:
on
1
Start
2
Kens background
3
History of security
4
Malware
5
Signatures
6
Bypass signature detection
7
How malware is today
8
Semantics
9
Healthcare
10
ZDI
11
Signature Index
12
My favorite hacker movies
13
Telephone method
14
Signature
15
Monitoring
16
Processes
17
Watch processes
18
Machine learning
19
Signature model
20
Business model
21
Statistical model
22
Silver Bullet
23
Threat Model
24
Crypto Mining
25
I got something different
26
My real name
27
Run it right
28
Sandbox
29
Customizing the sandbox
30
Key logger
31
File drops
32
Process IDs
33
Trend Slide
34
Web Filtering
35
Microsoft
36
Microsoft Toolkit
37
The Sandbox
38
Wrapup
39
Bringing it back
40
Conclusion
41
Questions
Description:
Explore the intricacies of malware detection and signature-based security in this conference talk from GrrCon 2018. Delve into the history of security, the evolution of malware, and the challenges of signature-based detection methods. Learn about bypass techniques, modern malware trends, and the impact on various sectors, including healthcare. Examine different approaches to malware detection, including monitoring processes, machine learning, and statistical models. Discover the limitations of signature-based detection and explore alternative methods such as sandboxing, threat modeling, and behavioral analysis. Gain insights into customizing sandboxes, identifying key indicators like file drops and process IDs, and understanding the role of web filtering and Microsoft's security toolkit. Conclude with a discussion on the future of malware detection and participate in a Q&A session to further enhance your understanding of this critical cybersecurity topic.

Do I Have a Signature to Detect That Malware

Add to list
0:00 / 0:00