Tag: conference
-
VB2016 paper: Defeating sandbox evasion: how to increase successful emulation rate in your virtualized environment
In order to analyse a potentially malicious binary, an important first step is to run it in a specialised virtual environment, or sandbox environment, and see what it does – if it exhibits some known malicious behaviour, it is probably worth blocking it. However, malware authors are wise to this analysis technique, and most pieces…
-
VB2016 paper: Mobile applications: a backdoor into the Internet of Things?
The meteoric rise of the Mirai botnet in recent months has led to the Internet of Things (IoT) becoming a major and actual security concern. To assess the effective security status of the so-called smart devices that make up the IoT, security researchers need to reverse engineer them – something that often isn’t trivial thanks to poor documentation…
-
VB2016 paper: Mobile applications: a backdoor into the Internet of Things?
The meteoric rise of the Mirai botnet in recent months has led to the Internet of Things (IoT) becoming a major and actual security concern. To assess the effective security status of the so-called smart devices that make up the IoT, security researchers need to reverse engineer them – something that often isn’t trivial thanks to poor documentation…
-
VB2016 paper: Wave your false flags! Deception tactics muddying attribution in targeted attacks
Security researchers have a complicated relationship with attribution. On the one hand, for technical analyses, it doesn’t matter whether an attack was performed by a Bear, a Panda or an Eagle, and whether it was Cozy or Fancy. But security research doesn’t exist in a void, and in an era where the overlap with geopolitics…
-
VB2016 paper: Wave your false flags! Deception tactics muddying attribution in targeted attacks
Security researchers have a complicated relationship with attribution. On the one hand, for technical analyses, it doesn’t matter whether an attack was performed by a Bear, a Panda or an Eagle, and whether it was Cozy or Fancy. But security research doesn’t exist in a void, and in an era where the overlap with geopolitics…
-
VB2016 paper: The TAO of Automated Iframe Injectors – Building Drive-by Platforms For Fun
VB2016 took place almost two weeks ago, since when we have had many requests to publish the papers presented at the conference, as well as the videos of those presentations. Virus Bulletin is all about bringing security experts together and making relevant information accessible to them and for that reason, subject to authors’ permission, we…
-
VB2016 paper: The TAO of Automated Iframe Injectors – Building Drive-by Platforms For Fun
VB2016 took place almost two weeks ago, since when we have had many requests to publish the papers presented at the conference, as well as the videos of those presentations. Virus Bulletin is all about bringing security experts together and making relevant information accessible to them and for that reason, subject to authors’ permission, we…
-
VB2016 preview: Cryptography mistakes in malware
“Don’t roll your own crypto”, software developers are often told: cryptography is hard and thus it is always safer to use a well-tested public library rather than writing your own implementation. Not everyone heeds that advice though, and among those not listening are the developers of various malware families. In a paper to be presented…
-
VB2016 preview: Cryptography mistakes in malware
“Don’t roll your own crypto”, software developers are often told: cryptography is hard and thus it is always safer to use a well-tested public library rather than writing your own implementation. Not everyone heeds that advice though, and among those not listening are the developers of various malware families. In a paper to be presented…
-
GPS technology is more at risk from cyber attack than ever before, security expert demonstrates at VB2016
An interview with VB2016 presenter Oleg Petrovsky of HPE Security research. Meeting Oleg Petrovsky, a senior anti-malware researcher at HPE Security research, is an experience. This tall, softly spoken fellow, now based in New York State, has a bright and unforgiving curiosity. Oleg’s keenness of mind shines throughout his VB2016 paper . This is a…