2.5 KiB
layout, permalink, title
| layout | permalink | title |
|---|---|---|
| default | /content/ | Content |
Presentations
Reverse Engineering Malware 101
- WiCys Conference 2017, DEF CON (Packet Hacking Village) 2017
.Net Hijacking to Defend Powershell slides
- BSides 2017, CanSecWest 2017
Instegogram: Leveraging Instagram for C2 via Image Steganography slides
- DefCon (Crypto Village) 2016
OSX Malware: Plists, Shell Scripts, and Objective-C, Oh-My! slides
- Mircon 2014
DLL Side-Loading: A Thorn in the Side of the Anti-Virus (AV) Industry slides
- RSA Conference 2014
Vehicle Embedded System Imaging & Extraction, Examination and Exploitation
- DoD Cyber Crime Conference 2012
Whitepapers
Malware Dynamic Behavior Classification: SVM-HMM applied to Malware API Sequencing
Johns Hopkins University
Dll Side-Loading: A Thorn in the Side of the Anti-Virus Industry
FireEye
Work Blogs
WCry/WanaCry Ransomware Technical Analysis
Endgame
Instegogram: Leveraging Instagram for C2 via Image Steganography
Endgame
Your Package Has Been Successfully Encrypted: TeslaCrypt 4.1A and the Malware Attack Chain Endgame
DOS AND DON’TS WITH DOCUMENT EMBEDDED OBJECTS
FireEye
FireEye
A NOT-SO CIVIC DUTY: ASPROX BOTNET CAMPAIGN SPREADS COURT DATES AND MALWARE
FireEye
TARGETED ATTACK TREND ALERT: PLUGX THE OLD DOG WITH A NEW TRICK
FireEye