Tag: sandbox
-
VB2016 paper: Defeating sandbox evasion: how to increase successful emulation rate in your virtualized environment
In order to analyse a potentially malicious binary, an important first step is to run it in a specialised virtual environment, or sandbox environment, and see what it does – if it exhibits some known malicious behaviour, it is probably worth blocking it. However, malware authors are wise to this analysis technique, and most pieces…
-
VB2016 paper: Defeating sandbox evasion: how to increase successful emulation rate in your virtualized environment
In order to analyse a potentially malicious binary, an important first step is to run it in a specialised virtual environment, or sandbox environment, and see what it does – if it exhibits some known malicious behaviour, it is probably worth blocking it. However, malware authors are wise to this analysis technique, and most pieces…
-
Back to the future: anti-virus engines and sandboxes
Szilard Stange makes the case for multi-engine malware scanning. The VB2015 conference takes place next month (30 September to 2 October) in Prague, with an exciting programme that covers many of today’s most pertinent security-related topics. In the run-up to the event, we have invited each of the VB2015 sponsors to write a guest post…
-
VB2014 paper: Duping the machine – malware strategies, post sandbox detection
James Wyke looks at malware that takes extra steps to frustrate researchers. Since the close of the VB2014 conference in Seattle in October, we have been sharing VB2014 conference papers as well as video recordings of the presentations. Today, we have added ‘Duping the machine – malware strategies, post sandbox detection’ by Sophos researcher James…
-
VB2014 preview: Duping the machine – malware strategies, post sandbox detection
James Wyke looks at four difference decoy methods. In the weeks running up to VB2014 (the 24th Virus Bulletin International Conference), we will look at some of the research that will be presented at the event. Today, we look at the paper ‘ Duping the machine – malware strategies, post sandbox detection ‘, from Sophos…
-
Google shows off in-house browser beta
Open-source ‘Chrome’ promises security as well as efficiency. Ever-expanding web giant Google has released an early version of its own browser, developed in house but under open-source principles, with a number of built-in security systems and techniques supplementing new ideas for speed and efficiency. The browser, dubbed ‘ Chrome ‘, will include alerts from Google…