Главная
Study mode:
on
1
Introduction
2
Diversity
3
Portability
4
Address mismatch
5
Analysis infrastructure
6
Data collection
7
Diversity problem
8
Analysis Tools
9
Upx
10
Dynamic Analysis
11
Feedback Loop
12
Deception
13
Detection
14
Rename
15
Detected
16
Tiny details
17
Conclusion
18
Questions
Description:
Explore the intricacies of Linux malware in this 19-minute conference talk presented at the 2018 IEEE Symposium on Security & Privacy. Delve into the challenges posed by the increasing adoption of embedded devices and the IoT revolution, which have led to a shift in the malware landscape. Examine the unique characteristics of Linux-based systems and their impact on malware development. Learn about the first comprehensive study aimed at characterizing, analyzing, and understanding Linux malware. Discover the design and implementation of a specialized malware analysis pipeline tailored for Linux systems. Gain insights from a large-scale measurement study conducted on over 10,000 malware samples collected over a year. Explore topics such as diversity, portability, address mismatch, analysis infrastructure, data collection, and various analysis tools including Upx and dynamic analysis techniques. Understand the importance of feedback loops, deception detection, and attention to tiny details in malware analysis. Conclude with a Q&A session to further expand your knowledge on this critical aspect of cybersecurity. Read more

Understanding Linux Malware

IEEE
Add to list
0:00 / 0:00