VB2019 paper: Static analysis methods for detection of Microsoft Office exploits

Though the typical malware attack in 2020 arrives by email and is executed via the enabling of

Office

macros, some attacks exploit (patched) vulnerabilities in

Office

that allow for the execution of malicious code when someone merely opens the file.

In a paper presented at VB2019 in London,

McAfee

researcher Chintan Shah presented methods for detecting such

Office

exploits using static analysis. The tool he wrote detected 80 to 100 per cent of

Office

exploits that have been used in targeted attacks in the wild.

Shah-figure26.jpg

Implementation of the static analysis engine.

Today we publish Chintan’s paper in both

HTML

and

PDF

format as well as the recording of his VB2019 presentation.

VB2019-conference-paper.jpg
Static analysis methods for detection of Microsoft Office exploits


Read the paper (HTML)


Download the paper (PDF)



Have you carried out research that furthers our understanding of the threat landscape? Have you discovered a technique that helps in the analysis of malware?

The

Call for Papers

for VB2020 in Dublin is open! Submit your abstract before

15 March

for a chance to make it onto the programme of one of the most international threat intelligence conferences.

Comments

Leave a Reply

Your email address will not be published. Required fields are marked *