YoVDO

The Advanced Threats Evolution- REsearchers Arm Race - Alex Matrosov - Ekoparty Security Conference - 2019

Offered By: Ekoparty Security Conference via YouTube

Tags

Ekoparty Security Conference Courses Cybersecurity Courses Reverse Engineering Courses Malware Analysis Courses Forensics Courses Offensive Security Courses Rootkits Courses

Course Description

Overview

Explore the evolution of advanced threats and the corresponding development of defensive software in this conference talk from Ekoparty 2019. Delve into the ongoing arms race between researchers and threat actors as they compete for dominance in the cybersecurity landscape. Examine how modern operating systems are implementing new mitigations to increase the cost of exploitation and malware persistence, while advanced threat actors seek lower levels of persistence closer to hardware and firmware. Investigate the gaps in current forensics and reverse engineering tools, and consider potential solutions to improve visibility and prevent advanced threats originating from levels where security sensors are absent. Learn from Alex Matrosov's extensive experience in reverse engineering, malware analysis, and firmware security as he provides insights into the challenges faced by security researchers in staying ahead of evolving threats.

Syllabus

Introduction
Alex Matrosov
The Golden Age
Firmware Implant
Endpoint Security
Windows Changes
BIOS Lock
Brave New World
Firmware Updates
Boot Guard
Firmware
Persistence
Golden Age
Mitigations
Offensive Research Team
Cloud Problems
Guest Bias
Coreboot Bias
Google Cloud
BMC
Supply chain problem
Hardware vendors
Secure Boot
Trauma Hudson
Alex Yermolov
Alexs research
Flagk
Supply Chain Hell
Root of Trust Problems
Microsoft Cerberus
Operation Shadow Hammer
Arm Race
Best Question


Taught by

Ekoparty Security Conference

Related Courses

Applied ChatGPT for Cybersecurity
Infosec via Coursera
Become an Influencer at Work
CreativeLive
Fundamentos de Ciberseguridad: un enfoque práctico
Inter-American Development Bank via edX
Advanced Malware Analysis: Redux
Cybrary
How to Use GDB (BSWJ)
Cybrary