Evasive Malware: How Attackers Bypass Dynamic Analysis

  • Date 05 Jun 2019

Evasive Malware: How Attackers Bypass Dynamic Analysis

05 Jun 2019, 14:00 - 14:25

Tech Talks
Language:
English

Mimecast’s Chief Scientist of Advanced Malware, Meni Farjon, will showcase high and low-level, known and unknown techniques for malware authors to evade currently dynamic analysis and network-based sandboxes.

Learning Outcomes:

  1. Audience will learn how attackers are keeping up with current next-generation anti-malware measures.
  2. Audience will learn in detail how dynamic analysis works, what are the pros and cons of the technique.
  3. What attackers are doing when considering evasion, at what point are these considerations made.
  4. Statistics on evasive malware, how often these targets specific solutions versus multiple evasions to target a bigger campaign.
  5. How next-gen malware analysis solutions works, and how attackers are leveraging exploits in those solutions.

 

Contributors

  • Meni Farjon

    Speaker

    Chief Scientist - Advanced Malware Detection

    Mimecast

    As Chief Scientist of Advanced Malware detection, Meni Farjon leads all technical ATP Research division in Mimecast and contributes to the efficacy,...

Business Issues covered

  1. What will this session help you to do?
    • Build a robust cyber response and resilience strategy
    • Demonstrate thought-leadership to ensure security is high for corporate agenda & capex justified‎

ReedExpo.Nova.Framework.Categorization.CategorySelection

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies.