YoVDO

Simulating Execution in Malicious Text Detection

Offered By: Hack In The Box Security Conference via YouTube

Tags

Hack In The Box Security Conference Courses Data Analysis Courses Feature Extraction Courses Cloud Security Courses Code Obfuscation Courses

Course Description

Overview

Explore advanced techniques for malicious text detection in this conference talk from the Hack In The Box Security Conference. Dive into the limitations of static detection methods and the advantages of dynamic detection algorithms. Learn about code obfuscation techniques used by attackers to hinder feature extraction and the importance of simulating execution environments. Discover how dynamic detection can overcome challenges in syntax and lexical constraints, resulting in lower false positive rates. Examine the trade-offs between static and dynamic detection methods, including implementation costs, detection speed, and compatibility issues. Gain insights from experienced security researchers on cloud security, host security, and malicious text detection. Understand the complexities of developing text-based sandboxes for detecting webshells and malicious scripts. Explore emerging challenges in sandbox solutions, such as branch, time, and network confrontations.

Syllabus

#HITB2022SIN #COMMSEC Simulating Execution In Malicious Text Detection - S. Wang & Y Sun


Taught by

Hack In The Box Security Conference

Related Courses

Social Network Analysis
University of Michigan via Coursera
Intro to Algorithms
Udacity
Data Analysis
Johns Hopkins University via Coursera
Computing for Data Analysis
Johns Hopkins University via Coursera
Health in Numbers: Quantitative Methods in Clinical & Public Health Research
Harvard University via edX