2.5 KiB
layout, permalink, title
| layout | permalink | title |
|---|---|---|
| default | /content/ | Content |
Presentations
Reverse Engineering Malware 101 WiCys Conference 2017, DEF CON (Packet Hacking Village) 2017
.Net Hijacking to Defend Powershell slides BSides 2017, CanSecWest 2017
Instegogram: Leveraging Instagram for C2 via Image Steganography slides DefCon (Crypto Village) 2016
OSX Malware: Plists, Shell Scripts, and Objective-C, Oh-My! slides Mircon 2014
DLL Side-Loading: A Thorn in the Side of the Anti-Virus (AV) Industry slides RSA Conference 2014
Vehicle Embedded System Imaging & Extraction, Examination and Exploitation DoD Cyber Crime Conference 2012
Whitepapers
-
Malware Dynamic Behavior Classification: SVM-HMM applied to Malware API Sequencing Johns Hopkins University
-
Dll Side-Loading: A Thorn in the Side of the Anti-Virus Industry FireEye
Work Blogs
-
Instegogram: Leveraging Instagram for C2 via Image Steganography Endgame
-
Your Package Has Been Successfully Encrypted: TeslaCrypt 4.1A and the Malware Attack Chain Endgame
-
MACROS GALORE FireEye
-
A NOT-SO CIVIC DUTY: ASPROX BOTNET CAMPAIGN SPREADS COURT DATES AND MALWARE FireEye
-
TARGETED ATTACK TREND ALERT: PLUGX THE OLD DOG WITH A NEW TRICK FireEye