Tag: dynamic analysis
-
VB2020 presentation: Behind the Black Mirror: simulating attacks with mock C2 servers
Dynamic analysis of a malicious sample in a lab setup can be hampered by the absence of the malware’s C2 server listening and providing responses – potentially resulting in only a partial picture of the sample’s behaviour and capabilities being revealed. At VB2020 localhost, Carbon Black ‘s Scott Knight presented an approach he and his colleagues…
-
VB2018 paper and video: Android app deobfuscation using static-dynamic cooperation
The two most common methods for analysing potentially malicious files each have their shortcomings. Dynamic analysis only looks at what actually happens when the code is run and can thus be frustrated by anti-analysis techniques. Static analysis doesn’t have this shortcoming, but is hindered by obfuscation used in the file. In a paper presented at…
-
VB2018 paper and video: Android app deobfuscation using static-dynamic cooperation
The two most common methods for analysing potentially malicious files each have their shortcomings. Dynamic analysis only looks at what actually happens when the code is run and can thus be frustrated by anti-analysis techniques. Static analysis doesn’t have this shortcoming, but is hindered by obfuscation used in the file. In a paper presented at…