Distributing the Reconstruction of High-Level Intermediate Representation
Offered By: Black Hat via YouTube
Course Description
Overview
Explore advanced techniques for distributed reverse engineering of malware using intermediate representation in a clustered environment. Delve into methods for constructing higher-level abstractions of malware code from abstract syntax trees provided by Hex-Rays Decompiler. Learn how to extract key characteristics like domain generation algorithms, custom encryption, and configuration data parsers. Examine the analysis of 2 million malware samples, providing insights to improve malware analysis and threat intelligence initiatives. Discover how to leverage this rich dataset for comparing new samples against millions of existing ones. Gain access to the developed Hex-Rays Decompiler plugin, analysis tools, and automation techniques used in this research, all of which will be made available on Github.
Syllabus
Distributing The Reconstruction Of High-Level Intermediate Representation...
Taught by
Black Hat
Related Courses
Proactive Computer SecurityUniversity of Colorado System via Coursera Security in Office 365
Microsoft via edX Threat Detection: Planning for a Secure Enterprise
Microsoft via edX Cyber Threat Intelligence
IBM via Coursera Security Analyst Fundamentals
IBM via Coursera