2.3 KiB
layout, permalink, title
| layout | permalink | title |
|---|---|---|
| default | /content/ | Content |
Presentations
[Reverse Engineering Malware 101] | WiCys Conference 2017, DEF CON 2017
.Net Hijacking to Defend Powershell slides | BSides 2017, CanSecWest
Instegogram: Leveraging Instagram for C2 via Image Steganography slides | DefCon (Crypto Village) 2016 |
OSX Malware: Plists, Shell Scripts, and Objective-C, Oh-My! slides | Mircon 2014
DLL Side-Loading: A Thorn in the Side of the Anti-Virus (AV) Industry slides | RSA Conference 2014
Vehicle Embedded System Imaging & Extraction, Examination and Exploitation | DoD Cyber Crime Conference 2012
Whitepapers
-
Malware Dynamic Behavior Classification: SVM-HMM applied to Malware API Sequencing | Johns Hopkins University
-
Dll Side-Loading: A Thorn in the Side of the Anti-Virus Industry
Work Blogs
-
Instegogram: Leveraging Instagram for C2 via Image Steganography | Endgame
-
Your Package Has Been Successfully Encrypted: TeslaCrypt 4.1A and the Malware Attack Chain | Endgame
-
MACROS GALORE | FireEye
-
A NOT-SO CIVIC DUTY: ASPROX BOTNET CAMPAIGN SPREADS COURT DATES AND MALWARE | FireEye
-
TARGETED ATTACK TREND ALERT: PLUGX THE OLD DOG WITH A NEW TRICK | FireEye