Harnessing Intelligence From Malware Repositories

Harnessing Intelligence From Malware Repositories

Black Hat via YouTube Direct link

Introduction

1 of 26

1 of 26

Introduction

Class Central Classrooms beta

YouTube playlists curated by Class Central.

Classroom Contents

Harnessing Intelligence From Malware Repositories

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Introduction
  2. 2 Welcome
  3. 3 Cybersecurity Disconnect
  4. 4 Jeff Moss
  5. 5 The economics of developing malware
  6. 6 Finding connections between malware
  7. 7 Google for Malware
  8. 8 The Challenge
  9. 9 VM Inversion
  10. 10 Semantic Fingerprint
  11. 11 Code Obfuscation
  12. 12 Code Normalization
  13. 13 Map to Code
  14. 14 Semantic Juice
  15. 15 Creating Indexes
  16. 16 Architecture
  17. 17 Results
  18. 18 Case Study
  19. 19 Unpacking
  20. 20 True Intelligence
  21. 21 Semantic Hashing
  22. 22 The beauty of semantic hashes
  23. 23 The impact of semantic hashes
  24. 24 Evolution of a malware family
  25. 25 Summary
  26. 26 Questions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.