Automated Malware Similarity Analysis Daniel Raygoza Black Hat - USA - 2009

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=jaPF86mv0XI



Duration: 23:42
1 views
0


Automated Malware Similarity Analysis
While it is fairly straightforward for a malware analyst to compare two pieces of malware for code reuse, it is not a simple task to scale to thousands of pieces of code. Many existing automated approaches focus on run-time analysis and critical trait extraction through signatures, but they don't focus on code reuse. Automated code reuse detection can help malware analysts quickly identify previously analyzed code, develop links between malware and its authors, and triage large volumes of incoming data. The tool and approach presented is best suited for groups that often perform in depth analysis of malware samples (including unpacking) and are looking for methods to develop links and reduce duplicated effort.

Black Hat - USA - 2009 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2021-12-29Dan Veeneman Wireless Overview Protocols and Threat Models
2021-12-29Panel Vulnerability Disclosure What the Feds Think
2021-12-28Welcome and Introduction to Black Hat USA 2009 Jeff Moss Black Hat - USA - 2009
2021-12-28The Language of Trust: Exploiting Trust Relationships in Active Content Mark Dowd, Ryan Smith
2021-12-28Recoverable Advanced Metering Infrastructure Mike Davis Black Hat - USA - 2009
2021-12-28Attacking SMS Zane Lackey, Luis Miras Black Hat - USA - 2009
2021-12-28Deactivate the Rootkit Alfredo Ortega Black Hat - USA - 2009
2021-12-28Is Your Phone Pwned Kevin Mahaffey, Anthony Lineberry, John Hering Black Hat - USA - 2009
2021-12-28Meet the Feds Feds vs Ex Feds Panel Black Hat - USA - 2009
2021-12-28Defensive Rewriting Bryan Sullivan Black Hat - USA - 2009
2021-12-28Automated Malware Similarity Analysis Daniel Raygoza Black Hat - USA - 2009
2021-12-28Beckstrom’s Law Rod Beckstrom Black Hat - USA - 2009
2021-12-28Demystifying Fuzzers Michael Eddington Black Hat - USA - 2009
2021-12-28Johnny Long Me to We Johnny Long Black Hat - USA - 2009
2021-12-28BitTorrent Hacks Michael Brooks Black Hat - USA - 2009
2021-12-28MetaPhish pt 1 Val Smith, Colin Ames & David Kerb Black Hat - USA - 2009
2021-12-28Economics and the Underground Economy Cormac Herley Black Hat - USA - 2009
2021-12-28Black Ops of PKI Dan Kaminski Black Hat - USA - 2009
2021-12-28Kismet and MSF Mike Kershaw Black Hat - USA - 2009
2021-12-28Fighting Russian Cybercrime Mobsters Dmitri Alperovitch Black Hat - USA - 2009
2021-12-28MetaPhish pt 2 Val Smith, Colin Ames & David Kerb Black Hat - USA - 2009



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
virus
information
hack
password
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering
DANIEL RAYGOZA
automated