Главная
Study mode:
on
1
Intro
2
Trivy Scan
3
Known Vulnerabilities
4
Misconfigurations
5
Real world evasive malware (DzMLT)
6
Software supply chain attacks
7
Static Image Scanning
8
Runtime Security - Shift Left
9
Dynamic scan vs. Runtime security
10
eBPF - Extended Barkley Packet Filter
11
Tracee
12
Summary
Description:
Explore dynamic image scanning through system tracing in this 37-minute conference talk by Itay Shakury from Aqua Security. Learn how malicious actors use sophisticated techniques to evade static analysis and signature-based scanning tools, and discover how dynamic analysis can detect these threats by observing application activity. Delve into the relationship between dynamic scanning, static scanning, and runtime security. Examine common behavioral patterns of malware and learn how to uncover threats using open-source tools. Cover topics such as Trivy Scan, known vulnerabilities, misconfigurations, real-world evasive malware (DzMLT), software supply chain attacks, static image scanning, runtime security, eBPF (Extended Berkeley Packet Filter), and Tracee. Gain insights into advanced security practices for detecting sophisticated threats in cloud-native environments.

Dynamic Image Scanning Through System Tracing

CNCF [Cloud Native Computing Foundation]
Add to list