Analyzing the Entropy of Document Hidden Code
Offered By: YouTube
Course Description
Overview
Explore the intricacies of document hidden code analysis in this 50-minute conference talk from Circle City Con 2015. Delve into the concept of entropy in the context of document malware, understanding its significance in measuring information and detecting malicious content. Learn about the methodology for processing code in bulk and calculating entropy, with a focus on malicious VBA and malware VBA. Discover techniques for defeating entropy detection and decoding hidden messages, including zero-order, first-order word, and second-order word methods. Examine real-world examples of hidden code and discuss strategies for catching such threats. Gain insights into the importance of English language patterns in code analysis and stay one step ahead of evolving threats in document security.
Syllabus
Intro
OUTLINE
DOCUMENT MALWARE
WHAT IS THE VALUE OF INFORMATION?
MEASURING INFORMATION
WHAT IS ENTROPY?
CALCULATING ENTROPY
ENTROPY EXAMPLE
REDUNDANCY
METHODOLOGY
PROCESS CODE IN BULK
ENTROPY OF MALICIOUS VBA
ENTROPY OF MALWARE VBA
TWO STEPS FORWARD, ONE STEP BACK DEFEATING ENTROPY DETECTION
HOW DO WE DECODE?
ZERO ORDER
FIRST ORDER WORD
SECOND ORDER WORD
WHY ENGLISH?
ONE STEP AHEAD?
EXAMPLE 1
HOW TO CATCH?
EXAMPLE 2
NAMES
Related Courses
Building Geospatial Apps on Postgres, PostGIS, & Citus at Large ScaleMicrosoft via YouTube Unlocking the Power of ML for Your JavaScript Applications with TensorFlow.js
TensorFlow via YouTube Managing the Reactive World with RxJava - Jake Wharton
ChariotSolutions via YouTube What's New in Grails 2.0
ChariotSolutions via YouTube Performance Analysis of Apache Spark and Presto in Cloud Environments
Databricks via YouTube