Simulating Execution in Malicious Text Detection
Offered By: Hack In The Box Security Conference via YouTube
Course Description
Overview
Explore advanced techniques for malicious text detection in this conference talk from the Hack In The Box Security Conference. Dive into the limitations of static detection methods and the advantages of dynamic detection algorithms. Learn about code obfuscation techniques used by attackers to hinder feature extraction and the importance of simulating execution environments. Discover how dynamic detection can overcome challenges in syntax and lexical constraints, resulting in lower false positive rates. Examine the trade-offs between static and dynamic detection methods, including implementation costs, detection speed, and compatibility issues. Gain insights from experienced security researchers on cloud security, host security, and malicious text detection. Understand the complexities of developing text-based sandboxes for detecting webshells and malicious scripts. Explore emerging challenges in sandbox solutions, such as branch, time, and network confrontations.
Syllabus
#HITB2022SIN #COMMSEC Simulating Execution In Malicious Text Detection - S. Wang & Y Sun
Taught by
Hack In The Box Security Conference
Related Courses
Browser Hacking With ANGLEHack In The Box Security Conference via YouTube Can A Fuzzer Match A Human
Hack In The Box Security Conference via YouTube Biometrics System Hacking in the Age of the Smart Vehicle
Hack In The Box Security Conference via YouTube ICEFALL - Revisiting A Decade Of OT Insecure-By-Design Practices
Hack In The Box Security Conference via YouTube Fuzzing the MCU of Connected Vehicles for Security and Safety
Hack In The Box Security Conference via YouTube